Powered by Deep Web Technologies
Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

2

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING  

E-Print Network [OSTI]

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

Cortesi, Tino

3

Database Management Certificate Program  

E-Print Network [OSTI]

Database Management Certificate Program DATABASE TECHNOLOGIES 13 Today, organizations in every to obtain general data analysis and management skills or apply both Oracle and Microsoft SQL Server database capabilities of relational databases in conjunction with the new "Big Data" management frameworks for data

Rose, Michael R.

4

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

5

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

6

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

7

U-084: Cisco Digital Media Manager Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

8

CIS 330: Database Management Systems Course Number & Title (A.1) CIS 330: Database Management Systems  

E-Print Network [OSTI]

CIS 330: Database Management Systems Course Number & Title (A.1) CIS 330: Database Management & Johannes Gehrke, Database Management Systems (third edition), McGraw Hill. Additional materials as handouts, e.g., research papers Catalog Description (A.5a) Introduction to database management systems

Plotkin, Joshua B.

9

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

10

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data  

Broader source: Energy.gov [DOE]

Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

11

Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Database Management Systems  

E-Print Network [OSTI]

What Is a DBMS? A database is a collection of data. Models real-world enterprise, e.g. university System (DBMS) is a software package designed to store and manage databases. #12;Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 3 Why we need DBMS Huge amount of data is available. Users need

Li, Yanjun "Lisa"

12

EERE Project Management Center Database PIA, The Office of Energy...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

EERE Project Management Center Database PIA, The Office of Energy Efficiency and Renewable Energy (EERE) EERE Project Management Center Database PIA, The Office of Energy...

13

T-614: Cisco Unified Communications Manager Database Security...  

Energy Savers [EERE]

614: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

14

The design and implementation of the buffer manager for an experimental relational database management system  

E-Print Network [OSTI]

Buffer management is an essential component of database management. This thesis presents a design and implementation of the buffer manager for an experimental relational database management system. The relationship and difference between database...

Li, Zaichun

1994-01-01T23:59:59.000Z

15

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: Debian SecurityBypass

16

WORKLOAD ADAPTATION IN AUTONOMIC DATABASE MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

in Autonomic DBMSs", Proceedings of the 2nd International Workshop on Self-Managing Database Systems (SMDB 2007 to meet its Service Level Objectives (SLOs). It is a challenge to adapt multiple workloads with complex scheduler that performs workload adaptation in a DBMS, as the test bed to prove the effectiveness

17

Proposed database model and file structures for arthropod collection management  

E-Print Network [OSTI]

Proposed database model and file structures for arthropod collection management Ronald A for taxonomic analysis or behavioral, physiological, and ecological information. The database model described how specific computerization projects can be related to each other. The proposed database model

Mathis, Wayne N.

18

CS 525: Advanced Database Organization Study of relational, semantic, and object-oriented data models and interfaces. Database management system  

E-Print Network [OSTI]

History of database management. Goals of database system development. Relational systems Data modelsCS 525: Advanced Database Organization Objectives Study of relational, semantic, and object-oriented data models and interfaces. Database management system techniques for query optimization, concurrency

Heller, Barbara

19

Managing and Querying Transaction-time Databases under Schema Evolution  

E-Print Network [OSTI]

problem of managing the history of database in- formation is now made more urgent and complex by fast evolution history. 1. INTRODUCTION The ability of archiving past database information and supporting when it comes to preservation of the database history. Converting the old database to a new one after

Zaniolo, Carlo

20

Performance Modeling and Access Methods for Temporal Database Management Systems  

E-Print Network [OSTI]

implementation issues. Database systems with temporal support maintain history data on line together with current. Performance Modeling and Access Methods for Temporal Database Management Systems TR86-018 August. #12;Performance Modeling and Access Methods for Temporal Database Management Systems by Ilsoo Ahn

North Carolina at Chapel Hill, University of

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

NGNP Risk Management Database: A Model for Managing Risk  

SciTech Connect (OSTI)

The Next Generation Nuclear Plant (NGNP) Risk Management System (RMS) is a database used to maintain the project risk register. The RMS also maps risk reduction activities to specific identified risks. Further functionality of the RMS includes mapping reactor suppliers Design Data Needs (DDNs) to risk reduction tasks and mapping Phenomena Identification Ranking Table (PIRTs) to associated risks. This document outlines the basic instructions on how to use the RMS. This document constitutes Revision 1 of the NGNP Risk Management Database: A Model for Managing Risk. It incorporates the latest enhancements to the RMS. The enhancements include six new custom views of risk data - Impact/Consequence, Tasks by Project Phase, Tasks by Status, Tasks by Project Phase/Status, Tasks by Impact/WBS, and Tasks by Phase/Impact/WBS.

John Collins; John M. Beck

2011-11-01T23:59:59.000Z

22

NGNP Risk Management Database: A Model for Managing Risk  

SciTech Connect (OSTI)

To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft® Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool’s design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

John Collins

2009-09-01T23:59:59.000Z

23

Flash Device Support for Database Management Philippe Bonnet  

E-Print Network [OSTI]

a DBMS to explicitly control IO behavior. We believe that these approaches are natural evolutions have a reference DBMS design nor a performance model for flash devices: database researchers devices should support database management. We ad- vocate that flash devices should provide DBMS with more

24

A Database Management System for the Federal Courts  

E-Print Network [OSTI]

A Database Management System for the Federal Courts JACK R. BUCHANAN, RICHARD D. FENNELL Federal Making Information Systems, Inc., McLean, VA 22101; R. D. Fennell, Federal Judicial Center, Washington, D and several large-scale information management systems projects have been undertaken within the Federal

Samet, Hanan

25

DOE technology information management system database study report  

SciTech Connect (OSTI)

To support the missions of the US Department of Energy (DOE) Special Technologies Program, Argonne National Laboratory is defining the requirements for an automated software system that will search electronic databases on technology. This report examines the work done and results to date. Argonne studied existing commercial and government sources of technology databases in five general areas: on-line services, patent database sources, government sources, aerospace technology sources, and general technology sources. First, it conducted a preliminary investigation of these sources to obtain information on the content, cost, frequency of updates, and other aspects of their databases. The Laboratory then performed detailed examinations of at least one source in each area. On this basis, Argonne recommended which databases should be incorporated in DOE`s Technology Information Management System.

Widing, M.A.; Blodgett, D.W.; Braun, M.D.; Jusko, M.J.; Keisler, J.M.; Love, R.J.; Robinson, G.L. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.

1994-11-01T23:59:59.000Z

26

Managing a Relational Database with Intelligent Agents Ira Rudowsky1  

E-Print Network [OSTI]

Managing a Relational Database with Intelligent Agents Ira Rudowsky1 , Olga Kulyba1 , Mikhail Kunin quality for search and retrieval. An intelligent agent was designed using JACKTM (Agent Oriented Software in genomic studies, which could impact data analysis and further research [9, 10]. A number of software tools

Rudowsky, Ira

27

Workload Class Importance Policy in Autonomic Database Management Harley Boughton  

E-Print Network [OSTI]

to resource allocation decisions in a database management system (DBMS). We focus on business policies that describe the relative importance of competing workloads on a DBMS. We present experiments with a simulation can be used to effectively allocate main memory resources in a commercial DBMS. 1. Introduction

28

The Oil and Natural Gas Knowledge Management Database from NETL  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The Knowledge Management Database (KMD) Portal provides four options for searching the documents and data that NETL-managed oil and gas research has produced over the years for DOE’s Office of Fossil Energy. Information includes R&D carried out under both historical and ongoing DOE oil and gas research and development (R&D). The Document Repository, the CD/DVD Library, the Project Summaries from 1990 to the present, and the Oil and Natural Gas Program Reference Shelf provide a wide range of flexibility and coverage.

29

Anonymous, authentic, and accountable resource management based on the E-cash paradigm  

E-Print Network [OSTI]

AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

Lam, Tak Cheung

2009-05-15T23:59:59.000Z

30

Scientific Workflow Management by Database Management Anastassia Ailamaki Yannis E. Ioannidis Miron Livny  

E-Print Network [OSTI]

and their interrelationships. Current Workflow Manage- ment Systems (WFMSs) use a Database Management Sys- tem (DBMS) to store task descriptions, and implement all workflow functionality in modules that run on top of the DBMS. Motivated by scientific workflows, we propose a much more DBMS-centric architecture, in which conven- tional

Ailamaki, Anastassia

31

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

32

Development of Energy Consumption Database Management System of Existing Large Public Buildings  

E-Print Network [OSTI]

The statistic data of energy consumption are the base of analyzing energy consumption. The scientific management method of energy consumption data and the development of database management system plays an important role in building energy...

Li, Y.; Zhang, J.; Sun, D.

2006-01-01T23:59:59.000Z

33

CONCEPTUAL DATA MODELING OF THE INTEGRATED DATABASE FOR THE RADIOACTIVE WASTE MANAGEMENT  

SciTech Connect (OSTI)

A study of a database system that can manage radioactive waste collectively on a network has been carried out. A conceptual data modeling that is based on the theory of information engineering (IE), which is the first step of the whole database development, has been studied to manage effectively information and data related to radioactive waste. In order to establish the scope of the database, user requirements and system configuration for radioactive waste management were analyzed. The major information extracted from user requirements are solid waste, liquid waste, gaseous waste, and waste related to spent fuel. The radioactive waste management system is planning to share information with associated companies.

Park, H.S; Shon, J.S; Kim, K.J; Park, J.H; Hong, K.P; Park, S.H

2003-02-27T23:59:59.000Z

34

Development of a relational database management system for Bovine Elite, Inc.  

E-Print Network [OSTI]

Record of Study DEVELOPMENT OF A RELATIONAL DATABASE MANAGEMENT SYSTEM FOR BOVINE ELITE, INC. A PROFESSIONAL PAPER by Enrique Fernindez Esquer Submitted to the College of Agriculture of Texas A@M University in partial fulfillment... of the requirements for the degree of MASTER OF AGRICULTURE August 1994 Animal Science Beef Cattle Management DEVELOPMENT OF A RELATIONAL DATABASE MANAGEMENT SYSTEM FOR BOVINE ELITE, INC. A Professional Paper by Enrique Fernandez Esquer Approved as to style...

Esquer, Enrique Fernandez

1994-01-01T23:59:59.000Z

35

Management Of Schema Evolution In Databases JosC Andany Michel LConard Carole Palisser  

E-Print Network [OSTI]

Management Of Schema Evolution In Databases JosC Andany Michel LConard Carole Palisser CUI CUI LIST. Introduction. In the database life cycle, the schema evolution problem first comes up during the design phase. However, its evolutive aspect is not specific to this phase.During the post-designphase,a schemacan

Madiraju, Praveen

36

Evaluating the Effectiveness of Fault Tolerance in Replicated Database Management Systems  

E-Print Network [OSTI]

-Olaf.Hvasshovd@idi.ntnu.no Abstract Database management systems (DBMS) achieve high availabilityand faulttolerance usuallyby of this study is two-fold. It eval- uates the effectiveness of DBMS fault tolerance in the pres- ence on database integrity, performance, and availability on a replicated DBMS, ClustRa[6], in the presence

37

MEDIMAGE A Multimedia Database Management System for Alzheimer's Disease Patients  

E-Print Network [OSTI]

to serve as a resource for the pediatric neuroimaging research community [6], (2) Brigham RAD Teaching Case Database Department of Radiology, Brigham and Women's Hospital Harvard Medical School [2], (3) Brain Web

Stanchev, Peter

38

Managing MEDLINE: A Comparison of a Native XML Database System with a Relational Database System  

E-Print Network [OSTI]

. The DTD (Document Type Definition) defines the integral structure of the XML document. It describes querying the database online, and in an effort to control load on the servers, NLM limits the number offers researchers to overcome the limitations of the query options offered by NLM's web interface

Madiraju, Praveen

39

Moving Objects Information Management: The Database (Vision Paper)  

E-Print Network [OSTI]

transportation and air traffic control, weather forecasting, emergency response, mobile resource management, and mobile workforce. Location management, i.e. the management of transient location information, is an enabling technology for all these applications. Location management is also a fundamental component

Wolfson, Ouri E.

40

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Energy Savers [EERE]

Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Generic Natural Systems Evaluation - Thermodynamic Database Development and Data Management  

SciTech Connect (OSTI)

Thermodynamic data are essential for understanding and evaluating geochemical processes, as by speciation-solubility calculations, reaction-path modeling, or reactive transport simulation. These data are required to evaluate both equilibrium states and the kinetic approach to such states (via the affinity term or its equivalent in commonly used rate laws). These types of calculations and the data needed to carry them out are a central feature of geochemistry in many applications, including water-rock interactions in natural systems at low and high temperatures. Such calculations are also made in engineering studies, for example studies of interactions involving man-made materials such as metal alloys and concrete. They are used in a fairly broad spectrum of repository studies where interactions take place among water, rock, and man-made materials (e.g., usage on YMP and WIPP). Waste form degradation, engineered barrier system performance, and near-field and far-field transport typically incorporate some level of thermodynamic modeling, requiring the relevant supporting data. Typical applications of thermodynamic modeling involve calculations of aqueous speciation (which is of great importance in the case of most radionuclides), solubilities of minerals and related solids, solubilities of gases, and stability relations among the various possible phases that might be present in a chemical system at a given temperature and pressure. If a phase can have a variable chemical composition, then a common calculational task is to determine that composition. Thermodynamic modeling also encompasses ion exchange and surface complexation processes. Any and all of these processes may be important in a geochemical process or reactive transport calculation. Such calculations are generally carried out using computer codes. For geochemical modeling calculations, codes such as EQ3/6 and PHREEQC, are commonly used. These codes typically provide 'full service' geochemistry, meaning that they use a large body of thermodynamic data, generally from a supporting database file, to sort out the various important reactions from a wide spectrum of possibilities, given specified inputs. Usually codes of this kind are used to construct models of initial aqueous solutions that represent initial conditions for some process, although sometimes these calculations also represent a desired end point. Such a calculation might be used to determine the major chemical species of a dissolved component, the solubility of a mineral or mineral-like solid, or to quantify deviation from equilibrium in the form of saturation indices. Reactive transport codes such as TOUGHREACT and NUFT generally require the user to determine which chemical species and reactions are important, and to provide the requisite set of information including thermodynamic data in an input file. Usually this information is abstracted from the output of a geochemical modeling code and its supporting thermodynamic data file. The Yucca Mountain Project (YMP) developed two qualified thermodynamic databases to model geochemical processes, including ones involving repository components such as spent fuel. The first of the two (BSC, 2007a) was for systems containing dilute aqueous solutions only, the other (BSC, 2007b) for systems involving concentrated aqueous solutions and incorporating a model for such based on Pitzer's (1991) equations. A 25 C-only database with similarities to the latter was also developed for the Waste Isolation Pilot Plant (WIPP, cf. Xiong, 2005). The NAGRA/PSI database (Hummel et al., 2002) was developed to support repository studies in Europe. The YMP databases are often used in non-repository studies, including studies of geothermal systems (e.g., Wolery and Carroll, 2010) and CO2 sequestration (e.g., Aines et al., 2011).

Wolery, T W; Sutton, M

2011-09-19T23:59:59.000Z

42

Uncertainty Management for Spatial Data in Databases: Fuzzy Spatial Data Types  

E-Print Network [OSTI]

Uncertainty Management for Spatial Data in Databases: Fuzzy Spatial Data Types Markus Schneider an abstract, conceptual model of so­called fuzzy spatial data types (i.e., a fuzzy spatial algebra types called spatial data types (see [Sch97] for a survey) have been designed for modeling these spatial

GĂĽting, Ralf Hartmut

43

A Temporal Approach to Managing Schema Evolution in Object Database Systems  

E-Print Network [OSTI]

A Temporal Approach to Managing Schema Evolution in Object Database Systems Iqbal A. Goralwalla,duane,ozsug@cs.ualberta.ca randal@cs.umanitoba.ca Abstract The issues of schema evolution and temporal object models are generally of a temporal object model. The result is a uniform treatment of schema evolution and temporal support for many

Szafron, Duane

44

Managing Contention and Timing Constraints in a RealTime Database System \\Lambda  

E-Print Network [OSTI]

22903, USA Abstract Previous work in real­time database management systems (RT­DBMS) has primarily based an actual RT­ DBMS on a real­time microkernel operating system. A real RT­DBMS must confront many practical of con­ structing a RT­DBMS is divided into three basic prob­ lems: dealing with resource contention

Son, Sang H.

45

System Support for Software Fault Tolerance in Highly Available Database Management Systems  

E-Print Network [OSTI]

of several techniques for early error detection and fast recovery in a database management system (DBMS system and the IMS DBMS and DB2 DBMS. The study classifies errors by the type of coding mistake system allow the DBMS to guard (write-protect) #12;2 some of its internal data structures. Guarding DBMS

California at Irvine, University of

46

Comprehensive online Atomic Database Management System (DBMS) with Highly Qualified Computing Capabilities  

E-Print Network [OSTI]

The intensive need of atomic data is expanding continuously in a wide variety of applications (e.g. fusion energy and astrophysics, laser-produced, plasma researches, and plasma processing).This paper will introduce our ongoing research work to build a comprehensive, complete, up-to-date, user friendly and online atomic Database Management System (DBMS) namely called AIMS by using SQLite (http://www.sqlite.org/about.html)(8). Programming language tools and techniques will not be covered here. The system allows the generation of various atomic data based on professional online atomic calculators. The ongoing work is a step forward to bring detailed atomic model accessible to a wide community of laboratory and astrophysical plasma diagnostics. AIMS is a professional worldwide tool for supporting several educational purposes and can be considered as a complementary database of IAEA atomic databases. Moreover, it will be an exceptional strategy of incorporating the output data of several atomic codes to external ...

Tahat, Amani

2011-01-01T23:59:59.000Z

47

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

48

Graph Databases for Large-Scale Healthcare Systems: A Framework for Efficient Data Management and Data Services  

SciTech Connect (OSTI)

Designing a database system for both efficient data management and data services has been one of the enduring challenges in the healthcare domain. In many healthcare systems, data services and data management are often viewed as two orthogonal tasks; data services refer to retrieval and analytic queries such as search, joins, statistical data extraction, and simple data mining algorithms, while data management refers to building error-tolerant and non-redundant database systems. The gap between service and management has resulted in rigid database systems and schemas that do not support effective analytics. We compose a rich graph structure from an abstracted healthcare RDBMS to illustrate how we can fill this gap in practice. We show how a healthcare graph can be automatically constructed from a normalized relational database using the proposed 3NF Equivalent Graph (3EG) transformation.We discuss a set of real world graph queries such as finding self-referrals, shared providers, and collaborative filtering, and evaluate their performance over a relational database and its 3EG-transformed graph. Experimental results show that the graph representation serves as multiple de-normalized tables, thus reducing complexity in a database and enhancing data accessibility of users. Based on this finding, we propose an ensemble framework of databases for healthcare applications.

Park, Yubin [University of Texas at Austin] [University of Texas at Austin; Shankar, Mallikarjun [ORNL] [ORNL; Park, Byung H [ORNL] [ORNL; Ghosh, Dr. Joydeep [University of Texas at Austin] [University of Texas at Austin

2014-01-01T23:59:59.000Z

49

Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy  

DOE Patents [OSTI]

A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

Strait, Robert S. (Oakland, CA); Pearson, Peter K. (Livermore, CA); Sengupta, Sailes K. (Livermore, CA)

2000-01-01T23:59:59.000Z

50

Object-Oriented Database for Managing Building Modeling Components and Metadata: Preprint  

SciTech Connect (OSTI)

Building simulation enables users to explore and evaluate multiple building designs. When tools for optimization, parametrics, and uncertainty analysis are combined with analysis engines, the sheer number of discrete simulation datasets makes it difficult to keep track of the inputs. The integrity of the input data is critical to designers, engineers, and researchers for code compliance, validation, and building commissioning long after the simulations are finished. This paper discusses an application that stores inputs needed for building energy modeling in a searchable, indexable, flexible, and scalable database to help address the problem of managing simulation input data.

Long, N.; Fleming, K.; Brackney, L.

2011-12-01T23:59:59.000Z

51

Authentication of byte sequences  

SciTech Connect (OSTI)

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

52

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

53

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

54

Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik Chuo N. Lau Matilde Montealegre  

E-Print Network [OSTI]

Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik, transaction management, ad-hoc networks. 1. INTRODUCTION Rapid developments in wireless technology have enabled mobile users to access data from different sites. The Mobile MultiDatabase Management Systems

Gruenwald, Le

55

Information flow in the DAMA Project beyond database managers: Information flow managers  

SciTech Connect (OSTI)

To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

Russell, L. [Argonne National Lab., IL (United States); Wolfson, O.; Yu, C. [Illinois Univ., Chicago, IL (United States)

1996-03-01T23:59:59.000Z

56

Public workstations: Authentication  

E-Print Network [OSTI]

identification. 3. Personal data With registration, library clients and guests accept that their personal dataPublic workstations: Authentication The public workstations require a personal login. This flyer will provide you with information on the procedure for receiving personal login details (authentication

Gilli, Adrian

57

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

58

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

59

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

60

Design, implementation, and benchmarking of a file manager for a relational database management system on a raw UNIX disk  

E-Print Network [OSTI]

together through the entire journey. Thanks to the Computer Science Dept. , Texas AErM University, for lending me a SPARC workstation to design Modstar. Jonathan Creighton, Oracle Corp. , and Pyung-Chul Kim of ETRI, Korea, were always helpful... relational operations with different storage organizations (index on key, index on non-key, no index, clustered, and non-clustered relations) on a test database created using Modstar. The design has been implemented on a SPARC workstation running SUN OS 4...

Narayanan, Pudugramam Shanker

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

COMPILATION AND MANAGEMENT OF ORP GLASS FORMULATION DATABASE, VSL-12R2470-1 REV 0  

SciTech Connect (OSTI)

The present report describes the first steps in the development of a glass property-composition database for WTP LAW and HL W glasses that includes all of the data that were used in the development of the WTP baseline models and all of the data collected subsequently as part of WTP enhancement studies perfonned for ORP. The data were reviewed to identifY some of the more significant gaps in the composition space that will need to be filled to support waste processing at Hanford. The WTP baseline models have been evaluated against the new data in terms of range of validity and prediction perfonnance.

Kruger, Albert A. [Department of Energy, Office of River Protection, Richland, Washington (United States); Pasieka, Holly K. [The Catholic University of America, Washington, DC (United States); Muller, Isabelle [The Catholic University of America, Washington, DC (United States); Gilbo, Konstantin [The Catholic University of America, Washington, DC (United States); Perez-Cardenas, Fernando [The Catholic University of America, Washington, DC (United States); Joseph, Innocent [The Catholic University of America, Washington, DC (United States); Pegg, Ian L. [The Catholic University of America, Washington, DC (United States); Kot, Wing K. [The Catholic University of America, Washington, DC (United States)

2012-12-13T23:59:59.000Z

62

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach  

E-Print Network [OSTI]

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

63

AN OBJECT-ORIENTED SGML/HYTIME COMPLIANT MULTIMEDIA DATABASE MANAGEMENT SYSTEM*  

E-Print Network [OSTI]

management system (DBMS) technology. Mostly they have used DBMSs to store meta-information and have stored of a large amount of data. The development of multimedia computing systems can benefit from traditional DBMS-information in some DBMS. Finally, the size and complexity of multimedia objects require special treatment in storage

Szafron, Duane

64

Towards Eco-friendly Database Management Systems Willis Lang and Jignesh M. Patel  

E-Print Network [OSTI]

consumption. In this paper we approach this issue by considering energy consumption as a first to directly manage the energy consumption. Both techniques trade energy consumption for performance. The first energy consumption by 49% of the original consumption while increasing the response time by only 3

Liblit, Ben

65

Attributes of the Federal Energy Management Program's Federal Site Building Characteristics Database  

SciTech Connect (OSTI)

Typically, the Federal building stock is referred to as a group of about one-half million buildings throughout the United States. Additional information beyond this level is generally limited to distribution of that total by agency and maybe distribution of the total by state. However, additional characterization of the Federal building stock is required as the Federal sector seeks ways to implement efficiency projects to reduce energy and water use intensity as mandated by legislation and Executive Order. Using a Federal facility database that was assembled for use in a geographic information system tool, additional characterization of the Federal building stock is provided including information regarding the geographical distribution of sites, building counts and percentage of total by agency, distribution of sites and building totals by agency, distribution of building count and floor space by Federal building type classification by agency, and rank ordering of sites, buildings, and floor space by state. A case study is provided regarding how the building stock has changed for the Department of Energy from 2000 through 2008.

Loper, Susan A.; Sandusky, William F.

2010-12-31T23:59:59.000Z

66

Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for  

E-Print Network [OSTI]

University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

67

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

68

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw  

Broader source: Energy.gov [DOE]

An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

69

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

70

IT Licentiate theses Query Authentication and  

E-Print Network [OSTI]

IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

Flener, Pierre

71

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

72

Distributed DatabasesDistributed Databases Based on material provided by:Based on material provided by  

E-Print Network [OSTI]

/References ?? A Database Management SystemA Database Management System (DBMS) is a software package designed(DBMS Databases, 2001 5 Why Use a DBMS?Why Use a DBMS? ?? Data IndependenceData Independence ?? Efficient Access data #12;J.J.Bunn, Distributed Databases, 2001 9 Concurrency ControlConcurrency Control ?? Good DBMS

73

U-168: EMC Documentum Information Rights Management Server Bugs...  

Broader source: Energy.gov (indexed) [DOE]

8: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote...

74

automated database mediation: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of database approach + Database Management System (DBMS) + Advantages of Using DBMS + Workers Adam, Salah 239 Mediated Homogenization Quantum Physics (arXiv) Summary:...

75

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

76

SU-E-J-129: A Strategy to Consolidate the Image Database of a VERO Unit Into a Radiotherapy Management System  

SciTech Connect (OSTI)

Purpose: To present a strategy to integrate the imaging database of a VERO unit with a treatment management system (TMS) to improve clinical workflow and consolidate image data to facilitate clinical quality control and documentation. Methods: A VERO unit is equipped with both kV and MV imaging capabilities for IGRT treatments. It has its own imaging database behind a firewall. It has been a challenge to transfer images on this unit to a TMS in a radiation therapy clinic so that registered images can be reviewed remotely with an approval or rejection record. In this study, a software system, iPump-VERO, was developed to connect VERO and a TMS in our clinic. The patient database folder on the VERO unit was mapped to a read-only folder on a file server outside VERO firewall. The application runs on a regular computer with the read access to the patient database folder. It finds the latest registered images and fuses them in one of six predefined patterns before sends them via DICOM connection to the TMS. The residual image registration errors will be overlaid on the fused image to facilitate image review. Results: The fused images of either registered kV planar images or CBCT images are fully DICOM compatible. A sentinel module is built to sense new registered images with negligible computing resources from the VERO ExacTrac imaging computer. It takes a few seconds to fuse registered images and send them to the TMS. The whole process is automated without any human intervention. Conclusion: Transferring images in DICOM connection is the easiest way to consolidate images of various sources in your TMS. Technically the attending does not have to go to the VERO treatment console to review image registration prior delivery. It is a useful tool for a busy clinic with a VERO unit.

Yan, Y; Medin, P; Yordy, J; Zhao, B; Jiang, S [UT Southwestern Medical Center, Dallas, TX (United States)

2014-06-01T23:59:59.000Z

77

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

78

Efficient Versioning for Scientific Array Databases  

E-Print Network [OSTI]

In this paper, we describe a versioned database storage manager we are developing for the SciDB scientific database. The system is designed to efficiently store and retrieve array-oriented data, exposing a "no-overwrite" ...

Seering, Adam

79

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

80

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy Savers [EERE]

231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

82

Artemis Chado database -practical guide Annotation in the database version of Artemis  

E-Print Network [OSTI]

-1- Artemis Chado database - practical guide Annotation in the database version of Artemis 1 directory for the backup files and optionally save this setting between sessions. Wait for the `Database and File Manager' to be loaded. Click on `Launch Artemis'. #12;-2- Artemis Chado database - practical guide

Maizels, Rick

83

REGULAR ENTRY IN ENCYCLOPEDIA OF DATABASE SYSTEMS  

E-Print Network [OSTI]

network. In a central DBMS the data is managed by one node whereas in a distributed DBMS the data is managed by several nodes. A distributed DBMS is a database manager consisting of several nodes distributed in the network. In a regular distributed DBMS it is up to the database administrator to manually specify how data

Risch, Tore

84

DRAFT Chapter 1 Introduction to spatial databases  

E-Print Network [OSTI]

. Today, data is housed in and managed via a database management system (DBMS). Databases and the software which manages them (DBMS) are the silent success story of the information age. They have slowly role of a DBMS has been that of a simple but e#11;ective warehouse of business and accounting data

Shekhar, Shashi

85

Database, Spatial Spatial databases are the foundation for computer-based applications involving spatially  

E-Print Network [OSTI]

managed using a particular type of software called a database management system (DBMS) that allows, leading to spatio-temporal databases when geometric evolutions are supported. Spatial databases can be implemented in a GIS, in a computer-assisted design (CAD) system coupled with a DBMS, in a universal server

86

Final report for the network authentication investigation and pilot.  

SciTech Connect (OSTI)

New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

2006-11-01T23:59:59.000Z

87

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

88

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudget AdvancedASSESSINGEnergy

89

A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots  

E-Print Network [OSTI]

of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

Paris-Sud XI, Université de

90

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards  

E-Print Network [OSTI]

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

Paris-Sud XI, Université de

91

Data Quality of Native XML Databases in the Healthcare Domain  

E-Print Network [OSTI]

.0 [Database Management]: Security, integrity and protection; K.6.4 [System Management]: Quality assurance; J.3 are not foolproof. This report reviews work on data quality in both database and management research areas support database systems provide in giving a measure of the quality of the data they hold. This inducts

North, Siobhán

92

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

93

Object Management Systems  

E-Print Network [OSTI]

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

94

Task 1.13 - Data Collection and Database Development for Clean Coal Technology By-Product Characteristics and Management Practices  

SciTech Connect (OSTI)

U.S. Department of Energy Federal Energy Technology Center-Morgantown (DOE FETC) efforts in the areas of fossil fuels and clean coal technology (CCT) have included involvement with both conventional and advanced process coal conversion by-products. In 1993, DOE submitted a Report to Congress on "Barriers to the Increased Utilization of Coal Combustion Desulfurization Byproducts by Governmental and Commercial Sectors" that provided an outline of activities to remove the barriers identified in the report. DOE charged itself with participation in this process, and the work proposed in this document facilitates DOE's response to its own recommendations for action. The work reflects DOE's commitment to the coal combustion by-product (CCB) industry, to the advancement of clean coal technology, and to cooperation with other government agencies. Information from DOE projects and commercial endeavors in fluidized-bed combustion (FBC) and coal gasification is the focus of this task. The primary goal is to provide an easily accessible compilation of characterization information on the by-products from these processes to government agencies and industry to facilitate sound regulatory and management decisions. Additional written documentation will facilitate the preparation of an updated final version of background information collected for DOE in preparation of the Report to Congress on barriers to CCB utilization.

Debra F. Pflughoeft-Hassett

1998-02-01T23:59:59.000Z

95

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

96

Introduction to Database Database Systems Lecture 1  

E-Print Network [OSTI]

Introduction to Database Systems Database Systems Lecture 1 Natasha Alechina www.cs.nott.ac.uk/~nza/G51DBS #12;In this Lecture · Course Information · Databases and Database Systems · Some History questions · Format similar to previous years. #12;Textbook · Recommended textbooks: · `Database Systems

Alechina, Natasha

97

The CEBAF Element Database  

SciTech Connect (OSTI)

With the inauguration of the CEBAF Element Database (CED) in Fall 2010, Jefferson Lab computer scientists have taken a step toward the eventual goal of a model-driven accelerator. Once fully populated, the database will be the primary repository of information used for everything from generating lattice decks to booting control computers to building controls screens. A requirement influencing the CED design is that it provide access to not only present, but also future and past configurations of the accelerator. To accomplish this, an introspective database schema was designed that allows new elements, types, and properties to be defined on-the-fly with no changes to table structure. Used in conjunction with Oracle Workspace Manager, it allows users to query data from any time in the database history with the same tools used to query the present configuration. Users can also check-out workspaces to use as staging areas for upcoming machine configurations. All Access to the CED is through a well-documented Application Programming Interface (API) that is translated automatically from original C++ source code into native libraries for scripting languages such as perl, php, and TCL making access to the CED easy and ubiquitous.

Theodore Larrieu, Christopher Slominski, Michele Joyce

2011-03-01T23:59:59.000Z

98

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

99

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

100

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

102

December 6, 1995 A MODEL FOR MATERIALS DATABASES  

E-Print Network [OSTI]

believe are the most closely related to future development of materials database management. Broadly advanced materials are unsuitable. 5. Interfaces provided by existing database management systemsDecember 6, 1995 A MODEL FOR MATERIALS DATABASES Gio Wiederhold Laie Caindec John McCarthy Ken

Wiederhold, Gio

103

March 23, 2008 Databases: Information Systems 1 Information Systems  

E-Print Network [OSTI]

March 23, 2008 Databases: Information Systems 1 Information Systems #12;March 23, 2008 Databases: Information Systems 2 Objectives What is an Information System (IS) + Classification of Information Systems + Evolution of Information Systems + Information System Management + Performance Requirements of ISs + #12

Adam, Salah

104

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

105

A SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE  

E-Print Network [OSTI]

. In this paper, we propose to secure an infrastructure providing telecommunication services on the Internet- bile Internet Telecommunication services (MobInTel). We present this infrastructure in detailsA SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE COMMUNICATION SERVICES OVER THE INTERNET Ir

von Bochmann, Gregor

106

Nuclear Concrete Materials Database Phase I Development  

SciTech Connect (OSTI)

The FY 2011 accomplishments in Phase I development of the Nuclear Concrete Materials Database to support the Light Water Reactor Sustainability Program are summarized. The database has been developed using the ORNL materials database infrastructure established for the Gen IV Materials Handbook to achieve cost reduction and development efficiency. In this Phase I development, the database has been successfully designed and constructed to manage documents in the Portable Document Format generated from the Structural Materials Handbook that contains nuclear concrete materials data and related information. The completion of the Phase I database has established a solid foundation for Phase II development, in which a digital database will be designed and constructed to manage nuclear concrete materials data in various digitized formats to facilitate electronic and mathematical processing for analysis, modeling, and design applications.

Ren, Weiju [ORNL; Naus, Dan J [ORNL

2012-05-01T23:59:59.000Z

107

Graphical visualization of implemented storage databases  

SciTech Connect (OSTI)

The PC-program LANUC, developed from Admintec, supports a decentralized or centralized storage management of radioactive waste. It gives the storekeeper a graphical view of a storage area and its contents which are otherwise only represented in lists and databases. The storekeeper can plan any movements within the storage area and once they are confirmed, the data in the database are automatically altered. Any implemented database can be represented by simulating a human operator with a program.

Fischer, C.; Hamp, H.P. [Admintec GmbH, Pforzheim (Germany)

1993-12-31T23:59:59.000Z

108

NUCLEAR STRUCTURE DATABASE  

E-Print Network [OSTI]

CALIFORNIA NUCLEAR STRUCTURE DATABASE R. B. Firestone and E.11089 NUCLEAR STRUCTURE DATABASE by R.B. Firestone and E.iii- NUCLEAR STRUCTURE DATABASE R.B Firestone and E. Browne

Firestone, R.B.

2010-01-01T23:59:59.000Z

109

Th D t b E i t dThe Database Environment and Developmentp  

E-Print Network [OSTI]

Basic Definitions · Database (DB): collection of dataDatabase (DB): collection of data. · DBMS: generic program Management System (DBMS) 1212 #12;Database Management Systemg y Application A software system that is used to create, maintain, and provide controlled access to user databases Application #1 (Order Filing) DBMS

110

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

111

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

112

VideoSTAR (Video STorage And Retrieval) is an experimental database frame-work for video information management. The development of this framework  

E-Print Network [OSTI]

ABSTRACT VideoSTAR (Video STorage And Retrieval) is an experimental database frame- work for video of traditional video tape archives are facing and by the multimedia technology that makes integrated, digital video archives feasible. Speci cally, VideoSTAR addresses issues related to sharing of video information

113

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

114

A Flexible Approach to Embedded Network Multicast Authentication  

E-Print Network [OSTI]

A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

Koopman, Philip

115

Shouhuai Xu 2000 1 Password-based Authentication and  

E-Print Network [OSTI]

&AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

Sandhu, Ravi

116

Biodiversity Database Developer/Programmer Academy of Natural Sciences, Philadelphia  

E-Print Network [OSTI]

Biodiversity Database Developer/Programmer Academy of Natural Sciences, Philadelphia (Position of Philadelphia seeks a database programmer who can develop desktop and web-based solutions for managing specimen), paleontology (fossils) and general invertebrates. Current databases hold more than 1 million records in various

Plotkin, Joshua B.

117

A Common Database Interface (DBI) R-Databases Special Interest Group  

E-Print Network [OSTI]

) and database management systems (DBMS). The interface defines a small set of classes and methods similar;2 Introduction The database interface (DBI) separates the connectivity to the DBMS into a "front-end" and a "back-end". Applications use only the exposed "front-end" API. The facilities that communicate with specific DBMS (Oracle

Bain, Mike

118

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

119

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network [OSTI]

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

120

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect (OSTI)

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

122

Lessons Learned From Developing Reactor Pressure Vessel Steel Embrittlement Database  

SciTech Connect (OSTI)

Materials behaviors caused by neutron irradiation under fission and/or fusion environments can be little understood without practical examination. Easily accessible material information system with large material database using effective computers is necessary for design of nuclear materials and analyses or simulations of the phenomena. The developed Embrittlement Data Base (EDB) at ORNL is this comprehensive collection of data. EDB database contains power reactor pressure vessel surveillance data, the material test reactor data, foreign reactor data (through bilateral agreements authorized by NRC), and the fracture toughness data. The lessons learned from building EDB program and the associated database management activity regarding Material Database Design Methodology, Architecture and the Embedded QA Protocol are described in this report. The development of IAEA International Database on Reactor Pressure Vessel Materials (IDRPVM) and the comparison of EDB database and IAEA IDRPVM database are provided in the report. The recommended database QA protocol and database infrastructure are also stated in the report.

Wang, Jy-An John [ORNL

2010-08-01T23:59:59.000Z

123

Development of specialized electronic bibliographic databases for deep ocean hydrocarbon production and transportation  

E-Print Network [OSTI]

, relational databases and the mathematical concept underlying the relational model, and the development of the relational database system, DOHPT. Database Management System A Database management system (DBMS) is a collection of interrelated data files...; and (iv) provides the users with higher level view of the data. The primary purpose of the DBMS is to provide an environment that is both convenient and efficient to use, to retrieve information from the database, and to store information...

Mahendran, Joseph Anthony

1992-01-01T23:59:59.000Z

124

DBDOC: Querying and Browsing Databases and Interrelated Documents  

E-Print Network [OSTI]

]: Database Administra- tion--Data warehouse and repository General Terms Management, Documentation, Design 1 to describe this structured data. Managing semi- structured sources, such as documents, text files, web pagesDBDOC: Querying and Browsing Databases and Interrelated Documents Carlos Garcia-Alvarado University

Ordonez, Carlos

125

The EMIME Bilingual Database   

E-Print Network [OSTI]

This paper describes the collection of a bilingual database of Finnish/English and German/English data. In addition, the accents of the talkers in the database have been rated. English, German and Finnish listeners assessed the English, German...

Wester, Mirjam

2010-01-01T23:59:59.000Z

126

Hazard Analysis Database report  

SciTech Connect (OSTI)

This document describes and defines the Hazard Analysis Database for the Tank Waste Remediation System Final Safety Analysis Report.

Niemi, B.J.

1997-08-12T23:59:59.000Z

127

ORACLE CERTIFICATION Oracle Database  

E-Print Network [OSTI]

ORACLE CERTIFICATION Oracle Database Administration Certificate Program Train with the best. Get your Oracle Database Administration education from the number-one provider* of Oracle training-on, lab-based understanding of Oracle, the world's leading database platform, and long the product

Loudon, Catherine

128

Database Encryption Luc Bouganim  

E-Print Network [OSTI]

Database Encryption Luc Bouganim INRIA Rocquencourt Le Chesnay, FRANCE Luc.Bouganim@inria.fr Yanli GUO INRIA Rocquencourt Le Chesnay, FRANCE yanli.guo@inria.fr Related concepts and keywords Database security, Data confidentiality, Hardware Security Module Definition Database encryption refers to the use

Paris-Sud XI, Université de

129

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

130

Database Description with SDM: A Semantic Database Model  

E-Print Network [OSTI]

Database Description with SDM: A Semantic Database Model MICHAEL HAMMER Massachusetts Institute of Technology and DENNIS McLEOD University of Southern California SDM is a high-level semantics-based database description and structuring formalism (database model) for databases. This database model is designed

McLeod, Dennis

131

Database tool ASGARD: an open-access database of  

E-Print Network [OSTI]

Database tool ASGARD: an open-access database of annotated transcriptomes for emerging model database, the Assembled Searchable Giant Arthropod Read Database (ASGARD). This database is a repository include search term auto-completion sug- gestions based on database content, the ability to download

Extavour, Cassandra

132

Testing Database-Centric Applications For Causes of Database Deadlocks  

E-Print Network [OSTI]

Testing Database-Centric Applications For Causes of Database Deadlocks Mark Grechanik, B. M. Mainul--Many organizations deploy applications that use databases by sending Structured Query Language (SQL) state- ments the same databases concurrently, database deadlocks routinely occur in these databases. Testing

Grechanik, Mark

133

How to Balance Privacy and Key Management in User Authentication  

E-Print Network [OSTI]

without electronic data? Privacy vs. Accountability #12;· CURRENTLY: The worst of both worlds: ­ Personal ­ Personal data cannot be located when you need it ­ (Or cannot be released due to a poorly designed ­ Personal data is only disclosed under well- defined conditions, to which the person agrees Privacy vs

134

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discovered aUsers

135

Authenticity and Physiological Changes during Defensive Verbal Response  

E-Print Network [OSTI]

who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how one’s cognitions, physiology, and behavior support or challenge...

Yen, Yana

2013-08-31T23:59:59.000Z

136

Understanding 'It': Affective Authenticity, Space, and the Phish Scene  

E-Print Network [OSTI]

"Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

Yeager, Elizabeth Anne

2011-04-26T23:59:59.000Z

137

2010 Worldwide Gasification Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The 2010 Worldwide Gasification Database describes the current world gasification industry and identifies near-term planned capacity additions. The database lists gasification projects and includes information (e.g., plant location, number and type of gasifiers, syngas capacity, feedstock, and products). The database reveals that the worldwide gasification capacity has continued to grow for the past several decades and is now at 70,817 megawatts thermal (MWth) of syngas output at 144 operating plants with a total of 412 gasifiers.

138

A Database in Every Sensor Nicolas Tsiftes  

E-Print Network [OSTI]

a database management system (DBMS), provid- ing a rich query interface to the flash storage of the node, we present Antelope, a complete DBMS for resource-constrained sen- sor devices, and a new flash indexing method called Max- Heap. Antelope, which to the best of our knowledge is the first DBMS

Dunkels, Adam

139

anesthetic management techniques: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

"Ozsu-Valduriez textbook Principles of Distributed Database Systems 10 reflects the evolution of distributed data management and distributed database systems. In this new...

140

Concurrency control in a fully replicated database environment  

E-Print Network [OSTI]

of the sites has a fully replicated copy of the database managed by a DBMS. The database consists of a number of named data items each having the time-stamp of the last transaction to update it. Att the messages concerned with this algorithm move in one...

Nath, Rajivendra

1992-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network [OSTI]

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

142

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

143

Hazard Analysis Database Report  

SciTech Connect (OSTI)

The Hazard Analysis Database was developed in conjunction with the hazard analysis activities conducted in accordance with DOE-STD-3009-94, Preparation Guide for U S . Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports, for HNF-SD-WM-SAR-067, Tank Farms Final Safety Analysis Report (FSAR). The FSAR is part of the approved Authorization Basis (AB) for the River Protection Project (RPP). This document describes, identifies, and defines the contents and structure of the Tank Farms FSAR Hazard Analysis Database and documents the configuration control changes made to the database. The Hazard Analysis Database contains the collection of information generated during the initial hazard evaluations and the subsequent hazard and accident analysis activities. The Hazard Analysis Database supports the preparation of Chapters 3 ,4 , and 5 of the Tank Farms FSAR and the Unreviewed Safety Question (USQ) process and consists of two major, interrelated data sets: (1) Hazard Analysis Database: Data from the results of the hazard evaluations, and (2) Hazard Topography Database: Data from the system familiarization and hazard identification.

GRAMS, W.H.

2000-12-28T23:59:59.000Z

144

Authentic, Dialogic Writing: Th e Case of a Letter to the Editor  

E-Print Network [OSTI]

A teacher educator reflects on the educational value of an authentic writing assignment inspired by real-world local events.

Hallman, Heidi L.

2009-01-01T23:59:59.000Z

145

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

146

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

147

The order of encryption and authentication for protecting communications (Or: how secure is SSL?)  

E-Print Network [OSTI]

The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

148

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

, or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

149

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

150

PATENTS OFFICE REGISTER DATABASE SEARCH  

E-Print Network [OSTI]

PATENTS OFFICE REGISTER & DATABASE SEARCH . Database Home PATENT REGISTER Status: Lapsed Grant No VERMEER MANUFACTURING COMPANY 2411 Highway 102 Pella, IA 50219 UNITED STATES OF AMERICA Address

Kansas, University of

151

The X.509 Privilege Management Infrastructure  

E-Print Network [OSTI]

Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It describes the entities Management Infrastructure (PMI), and it enables privileges to be allocated, delegated, revoked and withdrawn in an electronic way. A PMI is to authorisation what a Public Key Infrastructure (PKI) is to authentication

Kent, University of

152

Nuclear Science References Database  

E-Print Network [OSTI]

The Nuclear Science References (NSR) database together with its associated Web interface, is the world's only comprehensive source of easily accessible low- and intermediate-energy nuclear physics bibliographic information for more than 210,000 articles since the beginning of nuclear science. The weekly-updated NSR database provides essential support for nuclear data evaluation, compilation and research activities. The principles of the database and Web application development and maintenance are described. Examples of nuclear structure, reaction and decay applications are specifically included. The complete NSR database is freely available at the websites of the National Nuclear Data Center http://www.nndc.bnl.gov/nsr and the International Atomic Energy Agency http://www-nds.iaea.org/nsr.

B. Pritychenko; E. B?ták; B. Singh; J. Totans

2014-07-08T23:59:59.000Z

153

USER'S GUIDE DATABASE SYSTEM  

E-Print Network [OSTI]

server and runs on the PPPL VAX cluster under VMS. The MINGL database system for TFTR is composed on the VAX. This document describes the overall system in terms of how the various parts interact

154

ARTI Refrigerant Database  

SciTech Connect (OSTI)

The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M. [Calm (James M.), Great Falls, VA (United States)

1994-05-27T23:59:59.000Z

155

Crude Oil Analysis Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The composition and physical properties of crude oil vary widely from one reservoir to another within an oil field, as well as from one field or region to another. Although all oils consist of hydrocarbons and their derivatives, the proportions of various types of compounds differ greatly. This makes some oils more suitable than others for specific refining processes and uses. To take advantage of this diversity, one needs access to information in a large database of crude oil analyses. The Crude Oil Analysis Database (COADB) currently satisfies this need by offering 9,056 crude oil analyses. Of these, 8,500 are United States domestic oils. The database contains results of analysis of the general properties and chemical composition, as well as the field, formation, and geographic location of the crude oil sample. [Taken from the Introduction to COAMDATA_DESC.pdf, part of the zipped software and database file at http://www.netl.doe.gov/technologies/oil-gas/Software/database.html] Save the zipped file to your PC. When opened, it will contain PDF documents and a large Excel spreadsheet. It will also contain the database in Microsoft Access 2002.

Shay, Johanna Y.

156

Solid Waste Projection Model: Database (Version 1.4). Technical reference manual  

SciTech Connect (OSTI)

The Solid Waste Projection Model (SWPM) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC). The SWPM system provides a modeling and analysis environment that supports decisions in the process of evaluating various solid waste management alternatives. This document, one of a series describing the SWPM system, contains detailed information regarding the software and data structures utilized in developing the SWPM Version 1.4 Database. This document is intended for use by experienced database specialists and supports database maintenance, utility development, and database enhancement. Those interested in using the SWPM database should refer to the SWPM Database User`s Guide. This document is available from the PNL Task M Project Manager (D. L. Stiles, 509-372-4358), the PNL Task L Project Manager (L. L. Armacost, 509-372-4304), the WHC Restoration Projects Section Manager (509-372-1443), or the WHC Waste Characterization Manager (509-372-1193).

Blackburn, C.; Cillan, T.

1993-09-01T23:59:59.000Z

157

The GLIMS Glacier Database: a spatio-temporal database  

E-Print Network [OSTI]

The GLIMS Glacier Database: a spatio-temporal database implemented using Open Source tools Bruce countries #12;#12;#12;#12;#12;System components PostgreSQL (relational database) PostGIS (geospatial) GDAL (Geospatial Data Abstraction Library) Perl, PHP, Shapelib, ... #12;GLIMS Glacier Database System

Raup, Bruce H.

158

Records Management Vice-Chancellor's Directive 1 Records Management Vice-Chancellor's Directive  

E-Print Network [OSTI]

. Version control and change history Appendix 1. UTS Archives Collection Guidelines Appendix 2. Lifecycle Management Program (see section 5.2.4). Records database refers to the enterprise-wide records management database administered by University Records. The current records database is TRIM. #12;Records Management

University of Technology, Sydney

159

Integrated storage and querying of spatially varying data quality information in a relational spatial database  

E-Print Network [OSTI]

Integrated storage and querying of spatially varying data quality information in a relational Variation in Quality Keywords Spatial data quality; spatial database; relational database management system for storing and retrieving spatially varying data quality information in a relational spatial database. Rather

Duckham, Matt

160

Chapter 10 Creating and Maintaining Geographic Databases 131 Creating and Maintaining  

E-Print Network [OSTI]

(DBMS), a specialist piece of software designed to handle multi-user access to an integrated set of data and versioning. 10 #12;Chapter 10 Creating and Maintaining Geographic Databases 132 KEY WORDS AND CONCEPTS DBMS.2 Database management systems 10.3 Storing data in DBMS tables 10.4 SQL 10.5 Geographic database types

Wright, Dawn Jeannine

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Database Security Sabrina De Capitani di Vimercati, Dip. Elettronica, Universit a di Brescia, 25123 Brescia, Italy  

E-Print Network [OSTI]

data stored in a database is called a database management system DBMS. A database can be seen at di of the underlying operating system see Figure 2. Beside access and processing functionalities, each DBMS must also system, one may think that a DBMS does not need to deal with security as security functionalities

Samarati, Pierangela

162

Database Sampling with Functional Dependencies  

E-Print Network [OSTI]

Database Sampling with Functional Dependencies Jes´us Bisbal, Jane Grimson Department of Computer there is a need to prototype the database which the applications will use when in operation. A prototype database can be built by sampling data from an existing database. Including relevant semantic information when

Riera, Jesús Bisbal

163

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

164

ELmE : A Misuse Resistant Parallel Authenticated Encryption  

E-Print Network [OSTI]

-Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

165

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

166

Forging Attacks on two Authenticated Encryptions COBRA and POET  

E-Print Network [OSTI]

Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

167

Authenticated Streamwise On-line Encryption Patrick P. Tsang  

E-Print Network [OSTI]

and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

168

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees  

E-Print Network [OSTI]

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

Gummadi, Ramakrishna

169

Cryptanalysis of a recent two factor authentication scheme  

E-Print Network [OSTI]

Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

170

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

171

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

172

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

173

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

174

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

175

National Ambient Radiation Database  

SciTech Connect (OSTI)

The U.S. Environmental Protection Agency (EPA) recently developed a searchable database and website for the Environmental Radiation Ambient Monitoring System (ERAMS) data. This site contains nationwide radiation monitoring data for air particulates, precipitation, drinking water, surface water and pasteurized milk. This site provides location-specific as well as national information on environmental radioactivity across several media. It provides high quality data for assessing public exposure and environmental impacts resulting from nuclear emergencies and provides baseline data during routine conditions. The database and website are accessible at www.epa.gov/enviro/. This site contains (1) a query for the general public which is easy to use--limits the amount of information provided, but includes the ability to graph the data with risk benchmarks and (2) a query for a more technical user which allows access to all of the data in the database, (3) background information on ER AMS.

Dziuban, J.; Sears, R.

2003-02-25T23:59:59.000Z

176

ARTI Refrigerant Database  

SciTech Connect (OSTI)

The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air- conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on R-32, R-123, R-124, R- 125, R-134a, R-141b, R142b, R-143a, R-152a, R-290 (propane), R-717 (ammonia), ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses polyalkylene glycol (PAG), ester, and other lubricants. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits.

Calm, J.M.

1992-04-30T23:59:59.000Z

177

ASRS Database Report Set Fuel Management Issues  

E-Print Network [OSTI]

be limited. The National Aeronautics and Space Administration and its ASRS current contractor, Booz Allen Hamilton, specifically disclaim any responsibility for any interpretation which may be made by others

178

Solid waste projection model: Database version 1. 0 technical reference manual  

SciTech Connect (OSTI)

The Solid Waste Projection Model (SWPM) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC). The SWPM system provides a modeling and analysis environment that supports decisions in the process of evaluating various solid waste management alternatives. This document, one of a series describing the SWPM system, contains detailed information regarding the software and data structures utilized in developing the SWPM Version 1.0 Database. This document is intended for use by experienced database specialists and supports database maintenance, utility development, and database enhancement. Those interested in using the SWPM database should refer to the SWPM Database User's Guide. 14 figs., 6 tabs.

Carr, F.; Bowman, A.

1990-11-01T23:59:59.000Z

179

Relational Database SQL: Querying the Relational DB  

E-Print Network [OSTI]

: auto-completion and command history Weigang Qiu Relational Database & SQL #12;Relational Database SQLRelational Database SQL: Querying the Relational DB Workshop: the "genome" Database Relational Database & SQL Weigang Qiu Department of Biological Sciences Hunter College BIOL 425 Computational

Qiu, Weigang

180

AN OVERVIEW ON DATABASESAN OVERVIEW ON DATABASES What is a Database?What is a Database?  

E-Print Network [OSTI]

3/22/2011 1 1 AN OVERVIEW ON DATABASESAN OVERVIEW ON DATABASES C. Schweik 2 What is a Database?What is a Database? A well organized collection of data that are related in a meaningful way. Data can be accessed, structured and shared. #12;3/22/2011 2 3 Data in Database SystemsData in Database Systems should be:should be

Schweik, Charles M.

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

182

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

183

Science & Engineering Engineering Databases  

E-Print Network [OSTI]

-present. Good for computers, electronics, biomedical, control, electrical and ocean engineering, physics9/09 DK,DS Science & Engineering Library Engineering Databases How to search the engineering initials Special features: Limit to peer-reviewed journals Compendex [Engineering Index] 1884-present

Hampton, Randy

184

High Performance Buildings Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The High Performance Buildings Database is a shared resource for the building industry, a unique central repository of in-depth information and data on high-performance, green building projects across the United States and abroad. The database includes information on the energy use, environmental performance, design process, finances, and other aspects of each project. Members of the design and construction teams are listed, as are sources for additional information. In total, up to twelve screens of detailed information are provided for each project profile. Projects range in size from small single-family homes or tenant fit-outs within buildings to large commercial and institutional buildings and even entire campuses. The database is a data repository as well. A series of Web-based data-entry templates allows anyone to enter information about a building project into the database. Once a project has been submitted, each of the partner organizations can review the entry and choose whether or not to publish that particular project on its own Web site.

185

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

186

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

187

The EMIME Mandarin Bilingual Database   

E-Print Network [OSTI]

This paper describes the collection of a bilingual database of Mandarin/English data. In addition, the accents of the talkers in the database have been rated. English and Mandarin listeners assessed the English and Mandarin talkers' degree...

Wester, Mirjam; Liang, Hui

2011-01-01T23:59:59.000Z

188

A Case for Database Filesystems  

SciTech Connect (OSTI)

Data intensive science is offering new challenges and opportunities for Information Technology and traditional relational databases in particular. Database filesystems offer the potential to store Level Zero data and analyze Level 1 and Level 3 data within the same database system [2]. Scientific data is typically composed of both unstructured files and scalar data. Oracle SecureFiles is a new database filesystem feature in Oracle Database 11g that is specifically engineered to deliver high performance and scalability for storing unstructured or file data inside the Oracle database. SecureFiles presents the best of both the filesystem and the database worlds for unstructured content. Data stored inside SecureFiles can be queried or written at performance levels comparable to that of traditional filesystems while retaining the advantages of the Oracle database.

Adams, P A; Hax, J C

2009-05-13T23:59:59.000Z

189

Provably Secure Password-based Authentication in TLS  

SciTech Connect (OSTI)

In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

2005-12-20T23:59:59.000Z

190

ARTI Refrigerant Database  

SciTech Connect (OSTI)

The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air- conditioning and refrigeration equipment. The database identifies sources of specific information on R-32, R-123, R-124, R-125, R-134, R-134a, R-141b, R-142b, R-143a, R-152a, R-245ca, R-290 (propane), R- 717 (ammonia), ethers, and others as well as azeotropic and zeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, ester, and other synthetics as well as mineral oils. It also references documents on compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. A computerized version is available that includes retrieval software.

Calm, J.M.

1992-11-09T23:59:59.000Z

191

ARTI refrigerant database  

SciTech Connect (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M.

1996-11-15T23:59:59.000Z

192

ARTI refrigerant database  

SciTech Connect (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilities access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M. [Calm (James M.), Great Falls, VA (United States)

1999-01-01T23:59:59.000Z

193

ARTI refrigerant database  

SciTech Connect (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M.

1996-07-01T23:59:59.000Z

194

The LAndscape Management Policy Simulator (LAMPS)  

E-Print Network [OSTI]

Considerations Riparian Management Choices Leave Tree Strategies Transition Probabilities Stochastic EventsThe LAndscape Management Policy Simulator (LAMPS) Pete Bettinger Department of Forest Resources Management intentions Prices and costs GIS databases Land use pattern Land use change Stand structure

195

A Noisy 10GB Provenance Database  

E-Print Network [OSTI]

Workload The provenance database is generated from theperformance of the provenance database generation process tox-axis). Figure 4 shows the database being populated with

Cheah, You-Wei

2013-01-01T23:59:59.000Z

196

DATABASE FOR PREMATURE CONCRETE DETERIORATION  

E-Print Network [OSTI]

0-4085-P3 DATABASE FOR PREMATURE CONCRETE DETERIORATION Author: Kevin J. Folliard Project 0. This product presents the architecture for a database to collect relevant information on materials and mixture in developing and populating various materials- and structures-specific databases for both new concrete

Texas at Austin, University of

197

Mathematics Database ZMATH MSC 2000  

E-Print Network [OSTI]

Reviewer Service Subscription »ZMATH« ZMATH Database | Advanced Search Print ZMATH Database Simple Search Advanced Search Command Search Advanced Search Query: an:0852.4600 Fill in the form and click »SearchLanguage: English Search: ZMATH Contact World of Mathematics Database »ZMATH« MSC 2000 MSC 2010

Kutateladze, Semen Samsonovich

198

ARTI refrigerant database  

SciTech Connect (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufactures and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on many refrigerants including propane, ammonia, water, carbon dioxide, propylene, ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates.

Calm, J.M. [Calm (James M.), Great Falls, VA (United States)

1998-08-01T23:59:59.000Z

199

ARTI Refrigerant Database  

SciTech Connect (OSTI)

The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included. The database identifies sources of specific information on R-32, R-123, R-124, R-125, R-134, R-134a, R-141b, R-142b, R-143a, R-152a, R-245ca, R-290 (propane), R-717 (ammonia), ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, ester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents to accelerate availability of the information and will be completed or replaced in future updates.

Cain, J.M. (Calm (James M.), Great Falls, VA (United States))

1993-04-30T23:59:59.000Z

200

ARTI refrigerant database  

SciTech Connect (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on refrigerants. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates. Citations in this report are divided into the following topics: thermophysical properties; materials compatibility; lubricants and tribology; application data; safety; test and analysis methods; impacts; regulatory actions; substitute refrigerants; identification; absorption and adsorption; research programs; and miscellaneous documents. Information is also presented on ordering instructions for the computerized version.

Calm, J.M. [Calm (James M.), Great Falls, VA (United States)] [Calm (James M.), Great Falls, VA (United States)

1996-04-15T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

ARTI refrigerant database  

SciTech Connect (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alterative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on various refrigerants. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates.

Calm, J.M.

1997-02-01T23:59:59.000Z

202

A+M Collisional Databases in ALADDIN Format  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

ALADDIN (A Labelled Atomic Data Interface) is a database system developed in order to provide a standard and flexible format and interface for the exchange and management of atomic, molecular and plasma-material interaction data of interest to fusion research. As part of the Atomic and Molecular Data Information System (AMDIS), introduced by the IAEA Atomic and Molecular Data Unit, the ALADDIN interface is available on-line. Twelve databases from DOE and IAEA sources are available from the CFADC website under the heading A+M Collisional Databases.

203

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

204

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

205

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

206

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

soft- ware can certify particular outputs. Software Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 9 A Local Authentication...

207

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

208

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two...

209

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two...

210

ENVIRONMENTAL COMPLIANCE SERVICES CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS  

E-Print Network [OSTI]

· Environmental Database Development and Management · Storm Water Modeling #12;ENVIRONMENTAL COMPLIANCE SERVICES CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS CEMML of environmental managers. The Center provides assistance to environmental managers in compliance areas such as air

211

Accountable Certificate Management using Undeniable Attestations  

E-Print Network [OSTI]

¨uberneetika AS Akadeemia tee 21 12618 Tallinn, Estonia ahto.buldas@cyber.ee Peeter Laud Universit¨at des Saarlandes FB 14 management system. Moreover, authenticated search trees can be used in many security-critical applications for personal or classroom use is granted without fee provided that copies are not made or distributed

212

Databases | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005Department ofDOE AccidentWaste IsolationDashboards DashboardsDatabases

213

Pathogen Research Databases  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearch Welcome to the PacificCollaboration » Pathogen Databases

214

ARM Publications Database  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects of Global Warming?8 Apr 2015DatabaseSearchTips

215

Webinar: Hydrogen Storage Materials Database Demonstration |...  

Broader source: Energy.gov (indexed) [DOE]

Storage Materials Database Demonstration Webinar: Hydrogen Storage Materials Database Demonstration Presentation slides from the Fuel Cell Technologies Office webinar "Hydrogen...

216

National Residential Efficiency Measures Database Webinar Slides...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

National Residential Efficiency Measures Database Webinar Slides National Residential Efficiency Measures Database Webinar Slides Presentation slides for the Building Technologies...

217

A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Database Replication) \\Lambda  

E-Print Network [OSTI]

PIR Avoiding Database Replication) \\Lambda Yael Gertner y Shafi Goldwasser z Tal Malkin x February 1998 Abstract Private information retrieval (PIR) schemes enable users to obtain information from databases while keeping their queries secret from the database managers. We propose a new model for PIR

218

ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing  

E-Print Network [OSTI]

such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

219

Final report and recommendations of the ESnet Authentication Pilot Project  

SciTech Connect (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

220

Principles of spatial database analysis and design This chapter covers the fundamentals of spatial database analysis and design, It begins by  

E-Print Network [OSTI]

) system coupled with a database management system (DBMS), in a spatial engine accessed through an application programming interface (API), and sitting on top of a DBMS, in a universal (object

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

222

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

223

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

224

Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang  

E-Print Network [OSTI]

Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

225

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

226

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

Basin, David

227

SSL/TLS Session-Aware User Authentication Rolf Oppliger1  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

Basin, David

228

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

(International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

229

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme  

E-Print Network [OSTI]

, Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

230

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

231

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Xu, Wenyuan

232

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

233

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network [OSTI]

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

234

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

235

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network [OSTI]

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

236

Database Manipulation on Quantum Computers  

E-Print Network [OSTI]

Manipulating a database system on a quantum computer is an essential aim to benefit from the promising speed-up of quantum computers over classical computers in areas that take a vast amount of storage and processing time such as in databases. In this paper, the basic operations for manipulating the data in a quantum database will be defined, e.g. INSERT, UPDATE, DELETE, SELECT, backing up and restoring a database file. This gives the ability to perform the data processing that usually takes a long processing time on a classical database system, in a simultaneous way on a quantum computer. Defining a quantum version of more advanced concepts used in database systems, e.g. the referential integrity and the relational algebra, is a normal extension to this work

Ahmed Younes

2007-05-29T23:59:59.000Z

237

Incremental elasticity for array databases  

E-Print Network [OSTI]

Relational databases benefit significantly from elasticity, whereby they execute on a set of changing hardware resources provisioned to match their storage and processing requirements. Such flexibility is especially ...

Duggan, Jennie

238

Energy Citations Database (ECD) - Architecture  

Office of Scientific and Technical Information (OSTI)

Search Architecture - What Is under the hood? The Energy Citations Database makes searchable over two million bibliographic citations for energy and energy related STI from the...

239

THE SIMULATION OF BUSINESS RULES IN ACTIVE DATABASES USING EXPERT SYSTEM Ivan Bruha and Frantisek Franek Vladimir L. Rosicky  

E-Print Network [OSTI]

of Database Management Systems (DBMS) is concerned with an augmentation of DBMS by rules. Passive rules-based DBMS by business rules in mostly declarative form (as opposed to the more usual, but less manageable

Franek, Frantisek

240

THE SIMULATION OF BUSINESS RULES IN ACTIVE DATABASES USING EXPERT SYSTEM Ivan Bruha and Frantisek Franek Vladimir L. Rosicky  

E-Print Network [OSTI]

of Database Management Systems (DBMS) is concerned with an augmentation of DBMS by rules. Passive rules­based DBMS by business rules in mostly declarative form (as opposed to the more usual, but less manageable

Franek, Frantisek

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Ribosomal Database Project II  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The Ribosomal Database Project (RDP) provides ribosome related data and services to the scientific community, including online data analysis and aligned and annotated Bacterial small-subunit 16S rRNA sequences. As of March 2008, RDP Release 10 is available and currently (August 2009) contains 1,074,075 aligned 16S rRNA sequences. Data that can be downloaded include zipped GenBank and FASTA alignment files, a histogram (in Excel) of the number of RDP sequences spanning each base position, data in the Functional Gene Pipeline Repository, and various user submitted data. The RDP-II website also provides numerous analysis tools.[From the RDP-II home page at http://rdp.cme.msu.edu/index.jsp

242

Oracle Database DBFS Hierarchical Storage Overview  

SciTech Connect (OSTI)

The National Ignition Facility (NIF) at the Lawrence Livermore National Laboratory creates large numbers of images during each shot cycle for the analysis of optics, target inspection and target diagnostics. These images must be readily accessible once they are created and available for the 30 year lifetime of the facility. The Livermore Computing Center (LC) runs a High Performance Storage System (HPSS) that is capable of storing NIF's estimated 1 petabyte of diagnostic images at a fraction of what it would cost NIF to operate its own automated tape library. With Oracle 11g Release 2 database, it is now possible to create an application transparent, hierarchical storage system using the LC's HPSS. Using the Oracle DBMS-LOB and DBMS-DBFS-HS packages a SecureFile LOB can now be archived to storage outside of the database and accessed seamlessly through a DBFS 'link'. NIF has chosen to use this technology to implement a hierarchical store for its image based SecureFile LOBs. Using a modified external store and DBFS links, files are written to and read from a disk 'staging area' using Oracle's backup utility. Database external procedure calls invoke OS based scripts to manage a staging area and the transfer of the backup files between the staging area and the Lab's HPSS.

Rivenes, A

2011-07-25T23:59:59.000Z

243

The rice kinase database. A phylogenomic database for the rice kinome.  

E-Print Network [OSTI]

Bioinformatics The Rice Kinase Database.A Phylogenomic Database for the Rice Kinome 1[OA]created a phylogenomic database (http://rkd.ucdavis.edu) to

Dardick, Christopher; Chen, Johann; Richter, Todd; Ouyang, Shu; Ronald, Pamela

2007-01-01T23:59:59.000Z

244

PARALLEL DATABASE MACHINES Kjell Bratbergsengen  

E-Print Network [OSTI]

by NFR formerly NTNF, Intel Norway AS, Eltron AS and Norwegian Telecom. 1 February 13, 1996 8:51 am #12 The Norwegian Institute of Technology University of Trondheim Email: kjellb@idt.unit.no Summary The idea and database servers for "new" data types, notably film and video. THE TRAUMATIC HISTORY OF DATABASE COMPUTERS

245

TOWARDS UNIFYING DATABASE SCHEDULING AND  

E-Print Network [OSTI]

1 TOWARDS UNIFYING DATABASE SCHEDULING AND CONCURRENCY CONTROL: A FRONTIER APPROACH Gregory Jones previous work in real-time database concurrency control indexconcur- rency control and scheduling has focused on combiningvariations of traditional concurrency control techniques with real-time scheduling

Rhode Island, University of

246

Modularization of the DADAISM Ada Database System Architecture  

E-Print Network [OSTI]

the modularization of a new data- base management system architecture. This DBMS is not intended to be viewed 22, 1986 at Beijing, China. of modulespeci cations for a DBMS, which can be used to support any implemen- tation paradigm is necessary to handle the evolution of database systems over the next few

Keller, Arthur M.

247

Modularization of the DADAISM Ada Database System Architecture  

E-Print Network [OSTI]

the modularization of a new data­ base management system architecture. This DBMS is not intended to be viewed--22, 1986 at Beijing, China. of module specifications for a DBMS, which can be used to support any of those implemen­ tation paradigm is necessary to handle the evolution of database systems over the next few

Keller, Arthur M.

248

Stress Testing of Transactional Database Systems Jorge Augusto Meira  

E-Print Network [OSTI]

of Montpellier, France patrick.valduriez@inria.fr Abstract. Transactional database management systems (DBMS) have-based applications that tend to generate huge numbers of concurrent business operations are pushing DBMS performance to test DBMS performance under heavy workload conditions. Answering this question requires a testing

Boyer, Edmond

249

Grid Database Service Specification Document Identifier: GDSS-0.2  

E-Print Network [OSTI]

Grid Database Service Specification Document Identifier: GDSS-0.2 Date: 4th October 2002 Authors of networked resources. The Open Grid Services Architecture (OGSA) extends Web Services with consistent interfaces for creating, managing and exchanging information among Grid Services, which are dynamic

Glasgow, University of

250

A Bayesian Approach to Online Performance Modeling for Database Appliances using Gaussian Models  

E-Print Network [OSTI]

agreements (SLAs) and to maintain peak performance for database management systems (DBMS), database, and resource provisioning. Accurately predicting response times of DBMS queries is necessary for a DBA an efficient and highly ac- curate online DBMS performance model that is robust in the face of changing

Waterloo, University of

251

A Bayesian Approach to Online Performance Modeling for Database Appliances using Gaussian Models  

E-Print Network [OSTI]

- tain peak performance for database management systems (DBMS), database administrators (DBAs) need. Accurately predicting response times of DBMS queries is necessary for a DBA to effectively achieve and highly accurate online DBMS performance model that is robust in the face of changing workloads, data

Aboulnaga, Ashraf

252

RemusDB: Transparent High Availability for Database Umar Farooq Minhas Shriram Rajagopalan Brendan Cully Ashraf  

E-Print Network [OSTI]

present a technique for building a high-availability (HA) database management system (DBMS). The proposed technique can be ap- plied to any DBMS with little or no customization, and with reasonable performance capabilities. We show that while Remus and similar systems can protect a DBMS, database workloads incur

Aboulnaga, Ashraf

253

Secure Database Development Jan Jurjens (1) and Eduardo B. Fernandez (2)  

E-Print Network [OSTI]

, Florida Atlantic University, Boca Raton, FL 33431, USA http://www.cse.fau.edu/~ed Synonyms Secure DBMS in this encyclopedia (Database security). This section concentrates mostly on how to build the software of a DBMS, 6], there is little work on how to implement a secure Database Management System (DBMS). It is true

Jurjens, Jan

254

PATSEEK: Content Based Image Retrieval System for Patent Database Avinash Tiwari1  

E-Print Network [OSTI]

PATSEEK: Content Based Image Retrieval System for Patent Database Avinash Tiwari1 , Veena Bansal2 1,2 Industrial and Management Engineering Department IIT Kanpur 208016 India 2 veena@iitk.ac.in ABSTRACT A patent the patent database. In this paper, we describe PATSEEK that is an image based search system for US patent

Bansal, Veena

255

Temporal Databases Status and Research Directions  

E-Print Network [OSTI]

these databases several thousand years and look up the (then current) grain harvest. Oral histories, e.g., Homer transaction time, recording a history of updates made to the database. Such a database supports rollback to a previous stored state of the database. An historical database supports valid time, recording a history

Snodgrass, Richard T.

256

Database Hints for Readex's AccessUN  

E-Print Network [OSTI]

Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

Stowell, Michael

257

Chapter 20Chapter 20 Physical Database  

E-Print Network [OSTI]

1 Chapter 20Chapter 20 Physical Database Design and Tuning Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1. Physical Database Design in Relational Databases (1) Factors that Influence Physical Database Design: A. Analyzing the database queries and transactionsA. Analyzing

Yang, Jing

258

Business intelligence systems and user's parameters: an application to a documents' database  

E-Print Network [OSTI]

on a cognitive user evolution is presented. This model when used together with a good definition by a relational database management system (DBMS). Also, from this data warehouse is extracted multidimensional

Paris-Sud XI, Université de

259

EDIC RESEARCH PROPOSAL 1 A Trustworthy Physical Designer for Databases in  

E-Print Network [OSTI]

DIAS, I&C, EPFL Abstract--Configuring a state-of-the-art database management system (DBMS) to provide's estimates, they can propose designs that result in degraded instead of improved performance. Nowadays, DBMS

260

Home Heating Systems Design using PHP and MySQL Databases  

E-Print Network [OSTI]

This paper presents the use of a computer application based on a MySQL database, managed by PHP programs, allowing the selection of a heating device using coefficient-based calculus.

Karnyanszky, Tiberiu Marius

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The Impact of Databases on Knowledge Transfer: Simulation Providing Craig Schreiber  

E-Print Network [OSTI]

Management, Knowledge Transfer, Organizational Learning, Transactive Memory, Databases, Information and Organizational Systems Carnegie Mellon University Pittsburgh, Pennsylvania 15213 Abstract of Social and Organizational Systems Carnegie Mellon University Wean Hall 1325 Pittsburgh, Pennsylvania

Sadeh, Norman M.

262

DEVELOPMENT OF DATABASE ON FECAL SLUDGE COLLECTION, TREATMENT AND DISPOSAL IN THACHIN,  

E-Print Network [OSTI]

i DEVELOPMENT OF DATABASE ON FECAL SLUDGE COLLECTION, TREATMENT AND DISPOSAL IN THACHIN, CHAOPRAYA Sludge (FS) management and lacking of data on FS collection, treatment and disposal. Nevertheless, FS

Richner, Heinz

263

IMPROVING DATABASE DESIGN TEACHING IN SECONDARY EDUCATION  

E-Print Network [OSTI]

Review Copy IMPROVING DATABASE DESIGN TEACHING IN SECONDARY EDUCATION: ACTION RESEARCH Education, University of Patras, 26500, Patras, GREECE. Abstract Database design and use has educational interest for utilitarian and learning reasons. Database technology has significant economic impact

Paris-Sud XI, Université de

264

Intelligent Transportation Systems Deployment Statistics Database  

E-Print Network [OSTI]

Intelligent Transportation Systems Deployment Statistics Database Oak Ridge National Laboratory direction. In addition, through the ITS Deployment Tracking web site, the database supports other users in 2010. Users can also download the entire 2010 deployment tracking database through the website

265

Meteorological database for the United States  

E-Print Network [OSTI]

to Indoor Air Meteorological Database for the United StatesUC-402 Meteorological Database for the United States M.G.Abstract A meteorological database has been developed to aid

Apte, M.G.

2011-01-01T23:59:59.000Z

266

Solid Waste Projection Model: Database (Version 1.3). Technical reference manual  

SciTech Connect (OSTI)

The Solid Waste Projection Model (SWPM) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC). The SWPM system provides a modeling and analysis environment that supports decisions in the process of evaluating various solid waste management alternatives. This document, one of a series describing the SWPM system, contains detailed information regarding the software and data structures utilized in developing the SWPM Version 1.3 Database. This document is intended for use by experienced database specialists and supports database maintenance, utility development, and database enhancement.

Blackburn, C.L.

1991-11-01T23:59:59.000Z

267

Hydrogen Storage Materials Database Demonstration Webinar (Text...  

Broader source: Energy.gov (indexed) [DOE]

Database Demonstration Webinar (Text Version) Hydrogen Storage Materials Database Demonstration Webinar (Text Version) Below is the text version of the webinar titled "Hydrogen...

268

SIX GOING ON SEVEN Database Dictionary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SIX GOING ON SEVEN Database Dictionary This database dictionary provides a brief explanation of measure naming schemes and mapping used to align the Northwest Power and...

269

Accelerating Materials Discovery With World's Largest Database...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Expanding the World's Largest Database of Elastic Properties Expanding the World's Largest Database of Elastic Properties NERSC, Materials Project Help Scientists Increase...

270

ORISE: Human Subjects Research Database  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Human Subjects Research Database Section 10, Part 745 of the Code of Federal Regulations and U.S. Department of Energy (DOE) Orders 443.1 and 481.1 require the maintenance of...

271

Marine and Hydrokinetic Technology Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

DOE’s Marine and Hydrokinetic Technology Database provides up-to-date information on marine and hydrokinetic renewable energy, both in the U.S. and around the world. The database includes wave, tidal, current, and ocean thermal energy, and contains information on the various energy conversion technologies, companies active in the field, and development of projects in the water. Depending on the needs of the user, the database can present a snapshot of projects in a given region, assess the progress of a certain technology type, or provide a comprehensive view of the entire marine and hydrokinetic energy industry. Results are displayed as a list of technologies, companies, or projects. Data can be filtered by a number of criteria, including country/region, technology type, generation capacity, and technology or project stage. The database was updated in 2009 to include ocean thermal energy technologies, companies, and projects.

272

World electric power plants database  

SciTech Connect (OSTI)

This global database provides records for 104,000 generating units in over 220 countries. These units include installed and projected facilities, central stations and distributed plants operated by utilities, independent power companies and commercial and self-generators. Each record includes information on: geographic location and operating company; technology, fuel and boiler; generator manufacturers; steam conditions; unit capacity and age; turbine/engine; architect/engineer and constructor; and pollution control equipment. The database is issued quarterly.

NONE

2006-06-15T23:59:59.000Z

273

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

, it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

274

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

275

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network [OSTI]

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

Otey, Penny Addison

2011-10-21T23:59:59.000Z

276

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

277

Rice Glycosyltransferase (GT) Phylogenomic Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The Ronald Laboratory staff at the University of California-Davis has a primary research focus on the genes of the rice plant. They study the role that genetics plays in the way rice plants respond to their environment. They created the Rice GT Database in order to integrate functional genomic information for putative rice Glycosyltransferases (GTs). This database contains information on nearly 800 putative rice GTs (gene models) identified by sequence similarity searches based on the Carbohydrate Active enZymes (CAZy) database. The Rice GT Database provides a platform to display user-selected functional genomic data on a phylogenetic tree. This includes sequence information, mutant line information, expression data, etc. An interactive chromosomal map shows the position of all rice GTs, and links to rice annotation databases are included. The format is intended to "facilitate the comparison of closely related GTs within different families, as well as perform global comparisons between sets of related families." [From http://ricephylogenomics.ucdavis.edu/cellwalls/gt/genInfo.shtml] See also the primary paper discussing this work: Peijian Cao, Laura E. Bartley, Ki-Hong Jung and Pamela C. Ronalda. Construction of a Rice Glycosyltransferase Phylogenomic Database and Identification of Rice-Diverged Glycosyltransferases. Molecular Plant, 2008, 1(5): 858-877.

Ronald, Pamela

278

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect (OSTI)

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

279

Web-based feedback system: the life cycle management as continuous maintenance of apartment facility information  

E-Print Network [OSTI]

to make it efficient. A database requires a database management system (DBMS), a set of computer programs for organizing the information in a database, to manage its structure and control access to the data stored in the database [9]. A DBMS supports... the structuring of the database in a standard format and provides tools for data input, verification, storage, retrieval, query, and manipulation. According to Ramakishman [26], DBMS is software, designed to assist in maintaining and utilizing large collection...

Jeong, Jin Su

2006-10-30T23:59:59.000Z

280

DATATRIEVE used in a control-system database  

SciTech Connect (OSTI)

Process control of the Proton Storage Ring at Los Alamos will be accomplished by LSI-11/23 computers networked with a VAX-11/750. The database contains descriptions, status, and parameters of the hardware channels and equipment connected to the LSIs. Database entry and processing occur on the VAX, largely through DATATRIEVE user-friendly procedures. Data validity is checked during and after data entry by DATATRIEVE and FORTRAN language procedures. The database then is distilled into a machine-efficient form and distributed to the LSIs and VAX for use by the process-control software. This paper includes an overview of our application, an overview of DATATRIEVE, examples of DATATRIEVE concepts, features of DATATRIEVE that have been especially useful, features of DATATRIEVE that have been troublesome in this project, notes about the conversion from DATATRIEVE-11 to VAX-11 DATATRIEVE, and observations on data-management software in a control-system environment.

Greene, N.E.

1983-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A snapshot in time - the new TRUplanner database - 10400  

SciTech Connect (OSTI)

A new database was developed to augment transuranic (TRU) waste inventory information already captured within the Comprehensive Inventory Database (CID). This new database, known as the TRUplanner, includes information focused on site capability for TRU waste certification and availability to ship to either the Waste Isolation Pilot Plant (WIPP) or Idaho National Laboratory for final characterization and certification before coming to WIPP. Waste stream specific data is imported from the CID to the TRUplanner, and additional data is collected and entered as a result of interviews and site visits. This data is continuously updated as sites are visited. TRU waste information such as facility, equipment, and container information for waste streams, has been captured within the TRUplanner, and supports the Department of Energy, Carlsbad Field Office (CBFO) decision making and strategic planning activities. This infonnation is delivered via three built-in TRUplanner reports that are provided to CBFO management, Acceptable Knowledge (AK) Experts and the TRU Waste Inventory Team.

Estill, Wes [Los Alamos National Laboratory; Crawford, Beverly A [Los Alamos National Laboratory; Van Soest, Gregory D [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

282

A DATABASE FOR TRACKING POPULATIONS OF ENDANGERED, THREATENED, PROPOSED AND CANDIDATE SPECIES IN NATIONAL PARKS External Information Gathered Year-Round from Lists, Documents, Websites, etc.  

E-Print Network [OSTI]

A DATABASE FOR TRACKING POPULATIONS OF ENDANGERED, THREATENED, PROPOSED AND CANDIDATE SPECIES Expenditure Report Sent out to USFWS in October ( http://www.nature.nps.gov/biology/endangeredspecies/database, and the Endangered Species Program Manager at the Washington Office. Implement a database system that tracks

283

Summary of Bugs Database Jeremy Kepner  

E-Print Network [OSTI]

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

284

Benchmarking Database Systems A Systematic Approach  

E-Print Network [OSTI]

Benchmarking Database Systems A Systematic Approach Dina Bitton David J. DeWitt Carolyn Turbyfill-81ER10920. #12;ABSTRACT This paper describes a customized database and a comprehensive set of queries that can be used for sys- tematic benchmarking of relational database systems. Designing this database

Liblit, Ben

285

Protein sequence databases Rolf Apweiler1,  

E-Print Network [OSTI]

Information NREF non-redundant reference databases PDB Protein Data Bank PIR Protein Information Resource PIR

286

This is for information purposes only. Please plan your own program and refer to the University of Lethbridge Calendar for complete information. Contact the Undergraduate Programs Office in the Faculty of Management for advising information (E480; tel. 40  

E-Print Network [OSTI]

Environment Management 3040 - Finance Management 3051/Political Science 3421 - Managing People Development Management 3821 - Visual Programming Applications Management 4090 - Management Policy and Strategy Database Applications One of A or B: A. *Computer Science 3720 - Introduction to Software Engineering

Seldin, Jonathan P.

287

National Residential Efficiency Measures Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The National Residential Efficiency Measures Database is a publicly available, centralized resource of residential building retrofit measures and costs for the U.S. building industry. With support from the U.S. Department of Energy, NREL developed this tool to help users determine the most cost-effective retrofit measures for improving energy efficiency of existing homes. Software developers who require residential retrofit performance and cost data for applications that evaluate residential efficiency measures are the primary audience for this database. In addition, home performance contractors and manufacturers of residential materials and equipment may find this information useful. The database offers the following types of retrofit measures: 1) Appliances, 2) Domestic Hot Water, 3) Enclosure, 4) Heating, Ventilating, and Air Conditioning (HVAC), 5) Lighting, 6) Miscellaneous.

288

DOE Global Energy Storage Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The DOE International Energy Storage Database has more than 400 documented energy storage projects from 34 countries around the world. The database provides free, up-to-date information on grid-connected energy storage projects and relevant state and federal policies. More than 50 energy storage technologies are represented worldwide, including multiple battery technologies, compressed air energy storage, flywheels, gravel energy storage, hydrogen energy storage, pumped hydroelectric, superconducting magnetic energy storage, and thermal energy storage. The policy section of the database shows 18 federal and state policies addressing grid-connected energy storage, from rules and regulations to tariffs and other financial incentives. It is funded through DOE’s Sandia National Laboratories, and has been operating since January 2012.

289

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories  

Broader source: Energy.gov [DOE]

A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

290

Design and implementation of a departmental information management system  

E-Print Network [OSTI]

Management System (DBMS); 4. logical design; 5. physical design and 6. implementation. The following section brie y walks through each step [5]. The goals of the requirements analysis (Step 1) are to determine the data re- quirements of the database in terms... program, a degree program involves di erent documents. A Database Management System (DBMS) is computer software designed for the purpose of managing databases. Typical examples of DBMSs include Oracle, Microsoft SQL Server, and MySQL. Step 3 involves...

Xie, Dawen

2009-05-15T23:59:59.000Z

291

High-Performance Secure Database Access Technologies for HEP Grids  

SciTech Connect (OSTI)

The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.

Matthew Vranicar; John Weicher

2006-04-17T23:59:59.000Z

292

asset management system: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

techniques for early error detection and fast recovery in a database management system (DBMS California at Irvine, University of 405 Division of Information Information Systems...

293

asthma management system: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

techniques for early error detection and fast recovery in a database management system (DBMS California at Irvine, University of 302 Division of Information Information Systems...

294

Addison Wesley Longman, Inc. 2000, Elmasri/Navathe, Fundamentals of Database Systems, Third Edition FName MInit LName  

E-Print Network [OSTI]

/Navathe, Fundamentals of Database Systems, Third Edition FName Name LNameMInit BDate FOfficeSalary SsnSex Rank FPhone© Addison Wesley Longman, Inc. 2000, Elmasri/Navathe, Fundamentals of Database Systems, Third_EMPLOYEE SALARIED_EMPLOYEE TRADE_UNIONPROJECT MANAGES BELONGS_TO PayScale Salary EngTypeTGradeTypingSpeed d Three

Chen, Yangjun

295

Status Report on the Creation of a Preliminary Data Model and Dictionary for a New Petrologic Database  

SciTech Connect (OSTI)

A preliminary database has been developed that will allow mineralogy and bulk-rock geochemical information to be managed under configuration control and facilitate electronic querying. The database is currently developed in Microsoft Access as a collection of tables, views, and entry forms. Each field and table has been described in a data dictionary.

Mackley, Rob D.; Serkowski, John A.; Last, George V.

2008-06-30T23:59:59.000Z

296

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

297

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)  

E-Print Network [OSTI]

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Z¨urich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

Basin, David

298

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network [OSTI]

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

299

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network [OSTI]

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

300

A Methodology Database System Performance Evaluation  

E-Print Network [OSTI]

Corporation VAX 11 product line. The relational database systems/machines that are currently available for the VAX include the IDM 500 database machine, INGRES, INFORMEX, MISTRESS, ORACLE, RIM, and UNIFY. A user

Liblit, Ben

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

6.830 Database Systems, Fall 2005  

E-Print Network [OSTI]

This course relies on primary readings from the database community to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, ...

Madden, Samuel

302

Workload-Aware Database Monitoring and Consolidation  

E-Print Network [OSTI]

In most enterprises, databases are deployed on dedicated database servers. Often, these servers are underutilized much of the time. For example, in traces from almost 200 production servers from different organizations, ...

Curino, Carlo

303

Webinar: Hydrogen Storage Materials Database Demonstration  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar, Hydrogen Storage Materials Database Demonstration, originally presented on December 13, 2011.

304

Webinar: NREL's Fuel Cell Contaminant Database  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar titled "NREL's Fuel Cell Contaminant Database," originally presented on May 27, 2014.

305

1991-2005 National Solar Radiation Database  

SciTech Connect (OSTI)

This fact sheet provides an overview of the purpose, benefit, and features of the newly updated National Solar Radiation Database.

Wilcox, S.

2007-05-01T23:59:59.000Z

306

The Majorana Parts Tracking Database  

E-Print Network [OSTI]

The Majorana Demonstrator is an ultra-low background physics experiment searching for the neutrinoless double beta decay of $^{76}$Ge. The Majorana Parts Tracking Database is used to record the history of components used in the construction of the Demonstrator. The tracking implementation takes a novel approach based on the schema-free database technology CouchDB. Transportation, storage, and processes undergone by parts such as machining or cleaning are linked to part records. Tracking parts provides a great logistics benefit and an important quality assurance reference during construction. In addition, the location history of parts provides an estimate of their exposure to cosmic radiation. A web application for data entry and a radiation exposure calculator have been developed as tools for achieving the extreme radio-purity required for this rare decay search.

Abgrall, N; Avignone, F T; Bertrand, F E; Brudanin, V; Busch, M; Byram, D; Caldwell, A S; Chan, Y-D; Christofferson, C D; Combs, D C; Cuesta, C; Detwiler, J A; Doe, P J; Efremenko, Yu; Egorov, V; Ejiri, H; Elliott, S R; Esterline, J; Fast, J E; Finnerty, P; Fraenkle, F M; Galindo-Uribarri, A; Giovanetti, G K; Goett, J; Green, M P; Gruszko, J; Guiseppe, V E; Gusev, K; Hallin, A L; Hazama, R; Hegai, A; Henning, R; Hoppe, E W; Howard, S; Howe, M A; Keeter, K J; Kidd, M F; Kochetov, O; Kouzes, R T; LaFerriere, B D; Leon, J Diaz; Leviner, L E; Loach, J C; MacMullin, J; Martin, R D; Meijer, S J; Mertens, S; Miller, M L; Mizouni, L; Nomachi, M; Orrell, J L; O'Shaughnessy, C; Overman, N R; Petersburg, R; Phillips, D G; Poon, A W P; Pushkin, K; Radford, D C; Rager, J; Rielage, K; Robertson, R G H; Romero-Romero, E; Ronquest, M C; Shanks, B; Shima, T; Shirchenko, M; Snavely, K J; Snyder, N; Soin, A; Suriano, A M; Tedeschi, D; Thompson, J; Timkin, V; Tornow, W; Trimble, J E; Varner, R L; Vasilyev, S; Vetter, K; Vorren, K; White, B R; Wilkerson, J F; Wiseman, C; Xu, W; Yakushev, E; Young, A R; Yu, C -H; Zhitnikov, I

2015-01-01T23:59:59.000Z

307

The Majorana Parts Tracking Database  

E-Print Network [OSTI]

The Majorana Demonstrator is an ultra-low background physics experiment searching for the neutrinoless double beta decay of $^{76}$Ge. The Majorana Parts Tracking Database is used to record the history of components used in the construction of the Demonstrator. The tracking implementation takes a novel approach based on the schema-free database technology CouchDB. Transportation, storage, and processes undergone by parts such as machining or cleaning are linked to part records. Tracking parts provides a great logistics benefit and an important quality assurance reference during construction. In addition, the location history of parts provides an estimate of their exposure to cosmic radiation. A web application for data entry and a radiation exposure calculator have been developed as tools for achieving the extreme radio-purity required for this rare decay search.

The Majorana Collaboration; N. Abgrall; E. Aguayo; F. T. Avignone III; A. S. Barabash; F. E. Bertrand; V. Brudanin; M. Busch; D. Byram; A. S. Caldwell; Y-D. Chan; C. D. Christofferson; D. C. Combs; C. Cuesta; J. A. Detwiler; P. J. Doe; Yu. Efremenko; V. Egorov; H. Ejiri; S. R. Elliott; J. Esterline; J. E. Fast; P. Finnerty; F. M. Fraenkle; A. Galindo-Uribarri; G. K. Giovanetti; J. Goett; M. P. Green; J. Gruszko; V. E. Guiseppe; K. Gusev; A. L. Hallin; R. Hazama; A. Hegai; R. Henning; E. W. Hoppe; S. Howard; M. A. Howe; K. J. Keeter; M. F. Kidd; O. Kochetov; S. I. Konovalov; R. T. Kouzes; B. D. LaFerriere; J. Diaz Leon; L. E. Leviner; J. C. Loach; J. MacMullin; R. D. Martin; S. J. Meijer; S. Mertens; M. L. Miller; L. Mizouni; M. Nomachi; J. L. Orrell; C. O'Shaughnessy; N. R. Overman; R. Petersburg; D. G. Phillips II; A. W. P. Poon; K. Pushkin; D. C. Radford; J. Rager; K. Rielage; R. G. H. Robertson; E. Romero-Romero; M. C. Ronquest; B. Shanks; T. Shima; M. Shirchenko; K. J. Snavely; N. Snyder; A. Soin; A. M. Suriano; D. Tedeschi; J. Thompson; V. Timkin; W. Tornow; J. E. Trimble; R. L. Varner; S. Vasilyev; K. Vetter; K. Vorren; B. R. White; J. F. Wilkerson; C. Wiseman; W. Xu; E. Yakushev; A. R. Young; C. -H. Yu; V. Yumatov; I. Zhitnikov

2015-02-05T23:59:59.000Z

308

GOLD: The Genomes Online Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

Since its inception in 1997, GOLD has continuously monitored genome sequencing projects worldwide and has provided the community with a unique centralized resource that integrates diverse information related to Archaea, Bacteria, Eukaryotic and more recently Metagenomic sequencing projects. As of September 2007, GOLD recorded 639 completed genome projects. These projects have their complete sequence deposited into the public archival sequence databases such as GenBank EMBL,and DDBJ. From the total of 639 complete and published genome projects as of 9/2007, 527 were bacterial, 47 were archaeal and 65 were eukaryotic. In addition to the complete projects, there were 2158 ongoing sequencing projects. 1328 of those were bacterial, 59 archaeal and 771 eukaryotic projects. Two types of metadata are provided by GOLD: (i) project metadata and (ii) organism/environment metadata. GOLD CARD pages for every project are available from the link of every GOLD_STAMP ID. The information in every one of these pages is organized into three tables: (a) Organism information, (b) Genome project information and (c) External links. [The Genomes On Line Database (GOLD) in 2007: Status of genomic and metagenomic projects and their associated metadata, Konstantinos Liolios, Konstantinos Mavromatis, Nektarios Tavernarakis and Nikos C. Kyrpides, Nucleic Acids Research Advance Access published online on November 2, 2007, Nucleic Acids Research, doi:10.1093/nar/gkm884]

The basic tables in the GOLD database that can be browsed or searched include the following information:

  • Gold Stamp ID
  • Organism name
  • Domain
  • Links to information sources
  • Size and link to a map, when available
  • Chromosome number, Plas number, and GC content
  • A link for downloading the actual genome data
  • Institution that did the sequencing
  • Funding source
  • Database where information resides
  • Publication status and information

(Specialized Interface)

Kyrpides, Nikos; Liolios, Dinos; Chen, Amy; Tavernarakis, Nektarios; Hugenholtz, Philip; Markowitz, Victor; Bernal, Alex

309

Search Log Analysis of the ARTstor Cultural Heritage Image Database  

E-Print Network [OSTI]

Patterns in a Digital Image Database. Information RetrievalCultural Heritage Image Database A thesis submitted inCultural Heritage Image Database by Heather Ann Lowe Master

Lowe, Heather Ann

2013-01-01T23:59:59.000Z

310

SUN Attribute Database: Discovering, Annotating, and Recognizing Scene Attributes  

E-Print Network [OSTI]

SUN Attribute Database: Discovering, Annotating, and Recognizing Scene Attributes Genevieve attributes. Next, we build the "SUN attribute database" on top of the diverse SUN categorical database. Our

Hays, James

311

Data Modelling and Database Requirements Geographical Data  

E-Print Network [OSTI]

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Brief history 15 Definitions 15 The three-schema architecture 16 Features/services of databaseData Modelling and Database Requirements for Geographical Data HĂĄvard Tveite January, 1997 #12-Model Substitution, and adds new symbology that is relevant for geographical data. Database system requirements

312

Supporting Database Provenance under Schema Evolution  

E-Print Network [OSTI]

,11] have significantly simplified the problems of preserving the history of the database schemaSupporting Database Provenance under Schema Evolution Shi Gao and Carlo Zaniolo University of California, Los Angeles {gaoshi, zaniolo}@cs.ucla.edu Abstract. Database schema upgrades are common in modern

Zaniolo, Carlo

313

NICMOS HISTORY DATABASE AND April 10, 1998  

E-Print Network [OSTI]

1 NICMOS HISTORY DATABASE AND WEB TOOLS C. Tullos April 10, 1998 ABSTRACT The history of NICMOS. The Database and Data A convenient way of keeping a history of some of the NICMOS instrument parameters parameters apply. Instrument Science Report OSG-CAL 98-01 #12;2 NICMOS HISTORY DATABASE LAYOUT 2. The Web

Sirianni, Marco

314

Database Transposition for Constrained (Closed) Pattern Mining  

E-Print Network [OSTI]

Database Transposition for Constrained (Closed) Pattern Mining Baptiste Jeudy1 and Fran¸cois Rioult pat- terns in databases with pathological size. For example, experiments in genome biology usually provide databases with thousands of attributes (genes) but only tens of objects (experiments

Paris-Sud XI, Université de

315

Database System Concepts Silberschatz, Korth and Sudarshan  

E-Print Network [OSTI]

Database System Concepts ©Silberschatz, Korth and Sudarshan See www.db-book.com for conditions on re-use ©Silberschatz, Korth and SudarshanDatabase System Concepts Chapter 8: Application Design andChapter 8: Application Design and DevelopmentDevelopment #12;©Silberschatz, Korth and Sudarshan8.2Database

Dragan, Feodor F.

316

GRAPHDB -a database of Axel Kohnert  

E-Print Network [OSTI]

GRAPHDB - a database of graphs March 2003 Axel Kohnert University of Bayreuth http://btm2xg ADMIN DBUSER ¡£¢ DB ¤ ¥ GRAPHVIEWER ¦ GRAPHSERVER #12;A: The Database Part I. THE MASTER TABLE #12;B: The client access to the database There are several web pages which allow the search

Laue, Reinhard

317

DESCRIPTIVE TEXT SEA WATER INORGANIC CARBON DATABASE  

E-Print Network [OSTI]

DESCRIPTIVE TEXT SEA WATER INORGANIC CARBON DATABASE for the CARBON DIOXIDE INFORMATION OF OCEANOGRAPHY (SIO) I. GENERAL DESCRIPTION The database consists of tables presenting oceanic inorganic carbon, titration (total) alkalinity (database abbreviation: "ALK"), and the 13 C / 12 C isotopic ratio

318

Comprehensive Database on Concrete Creep and Shrinkage  

E-Print Network [OSTI]

Comprehensive Database on Concrete Creep and Shrinkage Zdenek P. Bazant and Guang-Hua Li Structural Database on Concrete Creep and Shrinkage Zdenek P. Bazant1 and Guang-Hua Li2 Abstract: As a sequel to the first large database created at Northwestern University in 1978, the paper presents a further

319

Computer Note A Prototype Object Database for  

E-Print Network [OSTI]

Computer Note A Prototype Object Database for Mitochondrial DNA Variation J. E. NEIGEL AND P preserved. We hope to prevent further loss by establishing a community database for population genetic surveys. We explored the feasibility of a population genetics database by developing a prototype

Neigel, Joseph E.

320

Bioinformatics The Maize Genetics and Genomics Database.  

E-Print Network [OSTI]

Bioinformatics The Maize Genetics and Genomics Database. The Community Resource for Access 50011­3260 (T.E.S.) The Maize Genetics and Genomics Database (MaizeGDB) serves the maize (Zea mays data types available through MaizeGDB. MISSION AND SCOPE The Maize Genetics and Genomics Database

Brendel, Volker

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

8, 76577702, 2008 A new database of  

E-Print Network [OSTI]

ACPD 8, 7657­7702, 2008 A new database of trace gases and aerosols B. Hassler et al. Title Page.0 License. Atmospheric Chemistry and Physics Discussions Technical Note: A new global database of trace­7702, 2008 A new database of trace gases and aerosols B. Hassler et al. Title Page Abstract Introduction

Paris-Sud XI, Université de

322

Databases  

E-Print Network [OSTI]

Mcgregor,D. Cockshott,P. Wilson,J. US Patent 6169990 British Patent, Volume BP 9604522.4 Academic Press

Mcgregor, D.; Cockshott, P.; Wilson, J.; US Patent 6169990 British Patent, Volume BP 9604522.4 Academic Press [More Details

323

Geothermal NEPA Database on OpenEI (Poster)  

SciTech Connect (OSTI)

The National Renewable Energy Laboratory (NREL) developed the Geothermal National Environmental Policy Act (NEPA) Database as a platform for government agencies and industry to access and maintain information related to geothermal NEPA documents. The data were collected to inform analyses of NEPA timelines, and the collected data were made publically available via this tool in case others might find the data useful. NREL staff and contractors collected documents from agency websites, during visits to the two busiest Bureau of Land Management (BLM) field offices for geothermal development, and through email and phone call requests from other BLM field offices. They then entered the information into the database, hosted by Open Energy Information (http://en.openei.org/wiki/RAPID/NEPA). The long-term success of the project will depend on the willingness of federal agencies, industry, and others to populate the database with NEPA and related documents, and to use the data for their own analyses. As the information and capabilities of the database expand, developers and agencies can save time on new NEPA reports by accessing a single location to research related activities, their potential impacts, and previously proposed and imposed mitigation measures. NREL used a wiki platform to allow industry and agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users.

Young, K. R.; Levine, A.

2014-09-01T23:59:59.000Z

324

Using XML to Build Efficient Transaction-Time Temporal Database Systems on Relational Databases  

E-Print Network [OSTI]

(virtual) representations of the database history, (b) XQuery to express powerful temporal queriesUsing XML to Build Efficient Transaction-Time Temporal Database Systems on Relational Databases the ArchIS system that achieves full-functionality transaction-time databases without re- quiring temporal

Zaniolo, Carlo

325

The USC CreativeIT Database: A Multimodal Database of Theatrical Improvisation  

E-Print Network [OSTI]

The USC CreativeIT Database: A Multimodal Database of Theatrical Improvisation Angeliki Metallinou' creativity. The USC CreativeIT database provides a novel bridge between the study of theatrical improvisation and human expressive behavior in dyadic interaction. The theoretical design of the database is based

Busso, Carlos

326

NIST Standard Reference Database 88 NIST/TRC Ideal Gas Database  

E-Print Network [OSTI]

#12;NIST Standard Reference Database 88 NIST/TRC Ideal Gas Database Version 2.0 Users' Guide Data of the database and to verify that the data contained therein have been selected on the basis of sound scientific that may result from errors or omissions in the database. COPYRIGHT (C) 2006 copyright by the U

Magee, Joseph W.

327

Database specification for the Worldwide Port System (WPS) Regional Integrated Cargo Database (ICDB)  

SciTech Connect (OSTI)

This Database Specification for the Worldwide Port System (WPS) Regional Integrated Cargo Database (ICDB) describes the database organization and storage allocation, provides the detailed data model of the logical and physical designs, and provides information for the construction of parts of the database such as tables, data elements, and associated dictionaries and diagrams.

Faby, E.Z.; Fluker, J.; Hancock, B.R.; Grubb, J.W.; Russell, D.L. [Univ. of Tennessee, Knoxville, TN (United States)] [Univ. of Tennessee, Knoxville, TN (United States); Loftis, J.P.; Shipe, P.C.; Truett, L.F. [Oak Ridge National Lab., TN (United States)] [Oak Ridge National Lab., TN (United States)

1994-03-01T23:59:59.000Z

328

Overview of selected molecular biological databases  

SciTech Connect (OSTI)

This paper presents an overview of the purpose, content, and design of a subset of the currently available biological databases, with an emphasis on protein databases. Databases included in this summary are 3D-ALI, Berlin RNA databank, Blocks, DSSP, EMBL Nucleotide Database, EMP, ENZYME, FSSP, GDB, GenBank, HSSP, LiMB, PDB, PIR, PKCDD, ProSite, and SWISS-PROT. The goal is to provide a starting point for researchers who wish to take advantage of the myriad available databases. Rather than providing a complete explanation of each database, we present its content and form by explaining the details of typical entries. Pointers to more complete ``user guides`` are included, along with general information on where to search for a new database.

Rayl, K.D.; Gaasterland, T.

1994-11-01T23:59:59.000Z

329

A Spreadsheet-Based User Interface for Managing Plural Relationships in Structured Data  

E-Print Network [OSTI]

A key feature of relational database applications is managing \\emph{plural} relationships---one-to-many and many-to-many---between entities. However, since it is often infeasible to adopt or develop a new database application ...

Bakke, Eirik

330

This overview covers: Connecting to a Chado Database  

E-Print Network [OSTI]

This overview covers: · Connecting to a Chado Database · Reading From the Database · iBatis Database Mapping · Gene Representation · Gene Building · Gene merging and splitting · Transfer Annotation Tool · Writing To The Database · Opening the Standalone Gene Builder · Community Annotation · Writing

Maizels, Rick

331

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

332

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a command

333

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere

334

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code | Department

335

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting

336

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

337

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

338

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

Basin, David

339

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

340

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and  

E-Print Network [OSTI]

Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication  

E-Print Network [OSTI]

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

Yang, Junfeng

342

Simplified authenticated key exchange based on the q(th) root problem  

SciTech Connect (OSTI)

Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

JOHNSTON,ANNA M.; GEMMELL,PETER S.

2000-02-29T23:59:59.000Z

343

Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for  

E-Print Network [OSTI]

to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

Hazas, Mike

344

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

345

Enhancing the DNA Patent Database  

SciTech Connect (OSTI)

Final Report on Award No. DE-FG0201ER63171 Principal Investigator: LeRoy B. Walters February 18, 2008 This project successfully completed its goal of surveying and reporting on the DNA patenting and licensing policies at 30 major U.S. academic institutions. The report of survey results was published in the January 2006 issue of Nature Biotechnology under the title “The Licensing of DNA Patents by US Academic Institutions: An Empirical Survey.” Lori Pressman was the lead author on this feature article. A PDF reprint of the article will be submitted to our Program Officer under separate cover. The project team has continued to update the DNA Patent Database on a weekly basis since the conclusion of the project. The database can be accessed at dnapatents.georgetown.edu. This database provides a valuable research tool for academic researchers, policymakers, and citizens. A report entitled Reaping the Benefits of Genomic and Proteomic Research: Intellectual Property Rights, Innovation, and Public Health was published in 2006 by the Committee on Intellectual Property Rights in Genomic and Protein Research and Innovation, Board on Science, Technology, and Economic Policy at the National Academies. The report was edited by Stephen A. Merrill and Anne-Marie Mazza. This report employed and then adapted the methodology developed by our research project and quoted our findings at several points. (The full report can be viewed online at the following URL: http://www.nap.edu/openbook.php?record_id=11487&page=R1). My colleagues and I are grateful for the research support of the ELSI program at the U.S. Department of Energy.

Walters, LeRoy B.

2008-02-18T23:59:59.000Z

346

Constrained Querying of Multimedia Databases  

E-Print Network [OSTI]

definitions using SQL and XML (MPEG-7 schema definitions). REFERENCES 1. “MPEG-7 applications document v.8.1.” ISO/IEC JTC1/SC29/WG11/M4839, MPEG99, July 1999. 2. “MPEG-7 requirements document v.10.” ISO/IEC JTC1/SC29/WG11/M4839N2996, MPEG99, Oct. 1999. 3. M...Constrained Querying of Multimedia Databases: Issues and Approaches Apostol (Paul) Natseva#3;y John R. Smithb Yuan-Chi Changb Chung-Sheng Lib Jeffrey S. Vittera aDepartment of Computer Science, Duke University, P.O. Box 90129, Durham, NC 27708...

Vitter, Jeffrey Scott; Natsev, Apostol; Smith, John R.; Chang, Yuan-Chi; Li, Chung-Sheng

2001-01-01T23:59:59.000Z

347

databases | netl.doe.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon Capture and Storageconvert program | credarr.xlscyber |2databases

348

Data Management Guide: Integrated Baseline System (IBS). Version 2.1  

SciTech Connect (OSTI)

The Integrated Baseline System (IBS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Nuclear and Chemical Agency (USANCA). The IBS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain a site-specific map database. Data and system managers use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of the IBS. This document provides a description of the data files and structures necessary for running the IBS software and using the site map database.

Bower, J.C. [Bower Software Services, Kennewick, Washington (United States)] Bower Software Services, Kennewick, Washington (United States); Burford, M.J.; Downing, T.R.; Moise, M.C.; Williams, J.R. [Pacific Northwest Lab., Richland, WA (United States)] Pacific Northwest Lab., Richland, WA (United States)

1995-01-01T23:59:59.000Z

349

Tri-party agreement databases, access mechanism and procedures. Revision 2  

SciTech Connect (OSTI)

This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc.

Brulotte, P.J.

1996-01-01T23:59:59.000Z

350

The Dartmouth Stellar Evolution Database  

E-Print Network [OSTI]

The ever-expanding depth and quality of photometric and spectroscopic observations of stellar populations increase the need for theoretical models in regions of age-composition parameter space that are largely unexplored at present. Stellar evolution models that employ the most advanced physics and cover a wide range of compositions are needed to extract the most information from current observations of both resolved and unresolved stellar populations. The Dartmouth Stellar Evolution Database is a collection of stellar evolution tracks and isochrones that spans a range of [Fe/H] from -2.5 to +0.5, [alpha/Fe] from -0.2 to +0.8 (for [Fe/H] 0), and initial He mass fractions from Y=0.245 to 0.40. Stellar evolution tracks were computed for masses between 0.1 and 4 Msun, allowing isochrones to be generated for ages as young as 250 Myr. For the range in masses where the core He flash occurs, separate He-burning tracks were computed starting from the zero age horizontal branch. The tracks and isochrones have been transformed to the observational plane in a variety of photometric systems including standard UBV(RI)c, Stromgren uvby, SDSS ugriz, 2MASS JHKs, and HST ACS-WFC and WFPC2. The Dartmouth Stellar Evolution Database is accessible through a website at http://stellar.dartmouth.edu/~models/ where all tracks, isochrones, and additional files can be downloaded.

Aaron Dotter; Brian Chaboyer; Darko Jevremovic; Veselin Kostov; E. Baron; J. W. Ferguson

2008-04-28T23:59:59.000Z

351

Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE  

E-Print Network [OSTI]

, authentication, provenance, and access control. Keywords-network cyber security; identity management; information environment, players1 are guided through a series of scenarios that highlight various cyber security education colleges. CyberCIEGE was created by the Center for Information Systems Security Studies and Research (CISR

352

An EAP ID-Based Authentication Method for Wireless Networks  

E-Print Network [OSTI]

(Certification Author- ity) and the burdensome management of certificates is removed. The presented) into IEEE 802 wired networks. It gave also birth to the IEEE 802.11i [2] which is more specific to wireless between two stations or a signature mechanism that lies on certificates to prove the ownership of a public

Paris-Sud XI, Université de

353

Sealion Database: Tracking and Characterization of Legacy Wastes  

SciTech Connect (OSTI)

The Radioactive Scrap and Waste Facility Liner-by-Liner Characterization Project was initiated to support waste management planning and disposition activities at the Materials and Fuels Complex located at the Idaho National Laboratory. The project scope consisted of a detailed examination of available historical records to consolidate information and eliminate discrepancies between sources. This information was captured in a new comprehensive searchable online database dubbed Sealion (Searchable Liner Online). For each storage liner and associated waste container, Sealion tracks the physical configuration, radiological data (e.g., source term, transuranic content, fissile content, and direct gamma radiation reading), Resource Conservation and Recovery Act characterization data, contents descriptions, and a variety of other waste management data. Historical hard-copy records were scanned and are stored in the database for easy access. In addition to storing the consolidated data in a library for easy retrieval or linking, Sealion serves as a tool in the development of batching plans for retrieving, transporting, processing, and, ultimately, dispositioning the waste. An integral search function allows the user to query for a variety of parameters in order to plan custom batches and account for facility or regulatory limitations (e.g., U.S. Department of Transportation limits, hazard category determinations, and fissile gram equivalent limitations). Liners can be combined or batched together and the combined results displayed in real-time graphs and tables showing the cumulative characteristics. The basic database architecture has proven to be adaptable to a variety of other similar applications. Sealion is capable of tracking segmented inventories (i.e., the liners can be replaced with storage drums, racks in a warehouse, or grids overlaid on a landfill). Additionally, the batching functions allow for the ability to combine inventory sub-locations into real-time graphs that summarize the characteristics of the contents for ease in comparison of characteristics to established thresholds or decision-making modeling needed to support waste-management operations.

Michel Hall; Brady Orchard; Brett Welty; James Rivera; Paul Walker; Reese Gannon

2010-03-01T23:59:59.000Z

354

Concurrency control in heterogeneous distributed database systems  

E-Print Network [OSTI]

APPROACHES IN HDDBS . III. A Approaches Requiring Local DBMS Modihcations 17 19 III. B Approaches Without Local DBMS Modifications 22 IV A NEW APPROACH TO HDDBS CONCURRENCY CONTROL 30 IV. A The Concurrency Control Scheme 30 CIIA PTER Page IV. B... related to Database Systems in general which will be used consistently throughout this thesis. A Database system (DBS) consists of a set of dutiibiises (DB) which contain the data of interest and software, the database msnageinent system (DBMS), which...

Rahman, Md. Rezaur

1992-01-01T23:59:59.000Z

355

Management Plan Management Plan  

E-Print Network [OSTI]

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

356

Buildings Performance Database Analysis Tools | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Save Consumers Billions Tools EnergyPlus Whole Building Energy Simulation OpenStudio Energy Simulation Application Suite Buildings Performance Database Building Energy...

357

Buildings Performance Database | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Consumers Billions Tools EnergyPlus Whole Building Energy Simulation OpenStudio Energy Simulation Application Suite Buildings Performance Database Building Energy Software Tools...

358

Buildings Performance Database Recommend Data Fields  

Broader source: Energy.gov [DOE]

Buildings Performance Database Recommend Data Fields, from the U.S. Department of Energy's Office of Energy Efficiency and Renewable Energy.

359

X-RAY MICROBEAM SPEECH PRODUCTION DATABASE  

E-Print Network [OSTI]

X-RAY MICROBEAM SPEECH PRODUCTION DATABASE USER'S HANDBOOK Version 1.0 (June 1994) prepared by John . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter Two: XRMB History

360

A Database Index to Large Biological Sequences  

E-Print Network [OSTI]

Hunt,E. Atkinson,M.P. Irving,R.W. Proceedings of the 27th Conference on Very Large Databases pp 139-148 Morgan Kaufmann

Hunt, E.

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Sandia Wind Turbine Loads Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The Sandia Wind Turbine Loads Database is divided into six files, each corresponding to approximately 16 years of simulation. The files are text files with data in columnar format. The 424MB zipped file containing six data files can be downloaded by the public. The files simulate 10-minute maximum loads for the NREL 5MW wind turbine. The details of the loads simulations can be found in the paper: “Decades of Wind Turbine Loads Simulations”, M. Barone, J. Paquette, B. Resor, and L. Manuel, AIAA2012-1288 (3.69MB PDF). Note that the site-average wind speed is 10 m/s (class I-B), not the 8.5 m/s reported in the paper.

362

Catalog of databases and reports  

SciTech Connect (OSTI)

This catalog provides information about the many reports and materials made available by the US Department of Energy`s (DOE`s) Global Change Research Program (GCRP) and the Carbon Dioxide Information Analysis Center (CDIAC). The catalog is divided into nine sections plus the author and title indexes: Section A--US Department of Energy Global Change Research Program Research Plans and Summaries; Section B--US Department of Energy Global Change Research Program Technical Reports; Section C--US Department of Energy Atmospheric Radiation Measurement (ARM) Program Reports; Section D--Other US Department of Energy Reports; Section E--CDIAC Reports; Section F--CDIAC Numeric Data and Computer Model Distribution; Section G--Other Databases Distributed by CDIAC; Section H--US Department of Agriculture Reports on Response of Vegetation to Carbon Dioxide; and Section I--Other Publications.

Burtis, M.D. [comp.

1997-04-01T23:59:59.000Z

363

Comp 5311 Database Management Systems 4. Structured Query Language  

E-Print Network [OSTI]

;5 Query 1: Find the total number of copies in stock for each poet SELECT poet, SUM (copies_in_stock) as sum FROM writer GROUP BY poet poet sum Douglas Livingstone 23 Mongane Wally 13 poet book copies Wally Must Weep 8 Mongane Wally A Tough Tale 2 #12;6 Query 2: For each poet, find the max, min, avg

Papadias, Dimitris

364

Managing Schema Changes in ObjectRelationship Databases ?  

E-Print Network [OSTI]

data schema versions is also needed. For these rea­ sons, support for full schema evolution is a required facility in any DB system. Full schema evolution concerns schema change or modiøcation, instance deønes the facet mechanism and shows its use in schema evolution. We end the paper by implementation

Boudjlida, Nacer

365

Micro-Specialization: Dynamic Code Specialization of Database Management Systems  

E-Print Network [OSTI]

performance. Much of the work to date on optimizing DBMS performance has emphasized ensuring efficient data to a particular kind of invariant. We realize these techniques, in concert termed micro-specialization, via a DBMS-independent run-time environment and apply them to a high- performance open-source DBMS, PostgreSQL. We show

Snodgrass, Richard T.

366

A Capacity Planning Study of Database Management Systems with  

E-Print Network [OSTI]

are a study of DBMS tuning factors influencing its performance under OLAP workload, the design and validation of a queueing network model to capture the main features of the DBMS behavior, and the use of a quantitative approach to project the DBMS performance with OLAP workload. We built a workload model for OLAP, which

367

EERE Project Management Center Database PIA, The Office of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005Department ofDOEDisability EmploymentDrain-Water HeatJob

368

T-614: Cisco Unified Communications Manager Database Security Vulnerability  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:| Department

369

Glycan fragment database: a database of PDB-based glycan 3D structures  

E-Print Network [OSTI]

The glycan fragment database (GFDB), freely available at http://www.glycanstructure.org, is a database of the glycosidic torsion angles derived from the glycan structures in the Protein Data Bank (PDB). Analogous to protein ...

Jo, Sunhwan; Im, Wonpil

2012-10-25T23:59:59.000Z

370

U.S. LIFE CYCLE INVENTORY DATABASE Goals of the U.S. LCI Database Project  

E-Print Network [OSTI]

U.S. LIFE CYCLE INVENTORY DATABASE ROADMAP rsed e #12;Goals of the U.S. LCI Database Project. Vision Statement The U.S. Life Cycle Inventory Database will be the recognized source of U.S.-based, quality, transparent life cycle inventory data and will become an integral part of the rapidly expanding

371

Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific  

E-Print Network [OSTI]

Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific information that has been gathered over 50 years of low-energy nuclear physics research worldwide. These powerful databases have enormous value and they represent a genuine national resource. Six core nuclear

Ohta, Shigemi

372

1. Integrated Database 2. Boundary Analysis  

E-Print Network [OSTI]

1. Integrated Database 2. Boundary Analysis Melinda Laituri Colorado State University June 2011 #12 data Model package/ Analysis technique #12;Establishing a Database What are our scales? What are our units of analysis? What commonality do we have? What is the nature of our data? What

373

Evolution towards, in, and beyond Object Databases  

E-Print Network [OSTI]

Evolution towards, in, and beyond Object Databases Marc H. Scholl and Markus Tresch Faculty ``evolution'' in the database arena. This paper tries to categorize some of these into a unique framework of ``external services'' to enrich DBMS functionalities. The following are presented in more detail: first, we

Scholl, Marc H.

374

CALIFORNIA ENERGY Small HVAC Database Of Monitored  

E-Print Network [OSTI]

CALIFORNIA ENERGY COMMISSION Small HVAC Database Of Monitored Information Database of Compiled of the Integrated Design of Small Commercial HVAC Systems research project. The reports are a result of funding: Productivity and Interior Environments Integrated Design of Large Commercial HVAC Systems Integrated Design

375

Publication Kind Codes in STN Patent Databases  

E-Print Network [OSTI]

Publication Kind Codes in STN Patent Databases Dokumentenart-Codes in STN-Patentdatenbanken Imprint Abstracts (CAPLUS), Chemical Abstracts (CAPLUS), Derwent World Patents Index (DWPI), and Derwent World Patents Index (DWPI)und INPADOCDB INPADOCDB international patent databases, together with a short

Hoffmann, Armin

376

Core Curriculum / 18 credits IS 6420 Database Theory and Design 3  

E-Print Network [OSTI]

and Analytics, Software and Systems Architecture, Product and Process Management, and IT Security. The new Analytics 3 IS 6571 IT Forensics 3 IS 6570 IT Security 3 ACCTG 6520 IT Risks and Controls 3 The MSIS programCore Curriculum / 18 credits IS 6420 Database Theory and Design 3 IS 6410 Information Systems

Tipple, Brett

377

The integration of digitized images, databases, and inventory protocol in an inventory updating program  

E-Print Network [OSTI]

is known as a database management system (DBMS). Among a DBMS's advantages (Humphrey and Biagio, 1986; Loucopoulos and Zicari, 1992) are the ability to query data, assurance of consistency of stored data, and the ability to share data with many users...

Wright, Charles Timothy

1993-01-01T23:59:59.000Z

378

Extracting UML/OCL Integrity Constraints and Derived Types from Relational Databases  

E-Print Network [OSTI]

the process different for each database management system (DBMS). To facilitate the comprehension of the enforced rules and their evolution, we be- lieve the rules must be described using an homogeneous for the Oracle DBMS. Moreover, our solution is based on the principles of Model Driven Engineering (MDE) which

Paris-Sud XI, Université de

379

To Appear in ACM SIGMOD Record December 2005 From Databases to Dataspaces  

E-Print Network [OSTI]

A Database Management System (DBMS) is a generic repository for the storage and querying of structured data. A DBMS offers a suite of interrelated services and guarantees that enables developers to focus today it is rarely the case that all the data can be fit nicely into a conventional re- lational DBMS

Halevy, Alon

380

Integrating and Querying Source Code of Programs Working on a Database  

E-Print Network [OSTI]

management system (DBMS). As a result, we present QDPC, a novel system that allows the inte- gration and flexible querying within a DBMS of source code and a database's schema. The integration focuses on obtain a DBMS. These sum- marization tables are then analyzed with SQL queries to find matches that are related

Ordonez, Carlos

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

The Ecobase Project: Database and Web Technologies for Environmental Information Systems  

E-Print Network [OSTI]

a profound impact on our ability to protect our environment, manage natural resources, prevent and respondThe Ecobase Project: Database and Web Technologies for Environmental Information Systems Ecobase in the context of several environmental applications in Brazil and Europe. We propose a distributed architecture

Bouganim, Luc

382

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect (OSTI)

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

383

South Carolina Department of Archives and History Archives and Records Management Service Area  

E-Print Network [OSTI]

South Carolina Department of Archives and History Archives and Records Management Service Area 1919 ...................................................................................................................8 12-1109. Data/Database Dictionary Reports

Kasman, Alex

384

Proposal for a High Energy Nuclear Database  

E-Print Network [OSTI]

We propose to develop a high-energy heavy-ion experimental database and make it accessible to the scientific community through an on-line interface. This database will be searchable and cross-indexed with relevant publications, including published detector descriptions. Since this database will be a community resource, it requires the high-energy nuclear physics community's financial and manpower support. This database should eventually contain all published data from Bevalac, AGS and SPS to RHIC and LHC energies, proton-proton to nucleus-nucleus collisions as well as other relevant systems, and all measured observables. Such a database would have tremendous scientific payoff as it makes systematic studies easier and allows simpler benchmarking of theoretical models to a broad range of old and new experiments. Furthermore, there is a growing need for compilations of high-energy nuclear data for applications including stockpile stewardship, technology development for inertial confinement fusion and target and ...

Vogt, D A B R

2005-01-01T23:59:59.000Z

385

Evolution of the Configuration Database Design  

SciTech Connect (OSTI)

The BABAR experiment at SLAC successfully collects physics data since 1999. One of the major parts of its on-line system is the configuration database which provides other parts of the system with the configuration data necessary for data taking. Originally the configuration database was implemented in the Objectivity/DB ODBMS. Recently BABAR performed a successful migration of its event store from Objectivity/DB to ROOT and this prompted a complete phase-out of the Objectivity/DB in all other BABAR databases. It required the complete redesign of the configuration database to hide any implementation details and to support multiple storage technologies. In this paper we describe the process of the migration of the configuration database, its new design, implementation strategy and details.

Salnikov, A

2006-04-19T23:59:59.000Z

386

Integrating end-to-end encryption and authentication technology into broadband networks  

SciTech Connect (OSTI)

BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

Pierson, L.G.

1995-11-01T23:59:59.000Z

387

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication

388

Design and Implementation of the CEBAF Element Database  

SciTech Connect (OSTI)

With inauguration of the CEBAF Element Database (CED) in Fall 2010, Jefferson Lab computer scientists have taken a first step toward the eventual goal of a model-driven accelerator. Once fully populated, the database will be the primary repository of information used for everything from generating lattice decks to booting front-end computers to building controls screens. A particular requirement influencing the CED design is that it must provide consistent access to not only present, but also future, and eventually past, configurations of the CEBAF accelerator. To accomplish this, an introspective database schema was designed that allows new elements, element types, and element properties to be defined on-the-fly without changing table structure. When used in conjunction with the Oracle Workspace Manager, it allows users to seamlessly query data from any time in the database history with the exact same tools as they use for querying the present configuration. Users can also check-out workspaces and use them as staging areas for upcoming machine configurations. All Access to the CED is through a well-documented API that is translated automatically from original C++ into native libraries for script languages such as perl, php, and TCL making access to the CED easy and ubiquitous. Notice: Authored by Jefferson Science Associates, LLC under U.S. DOE Contract No. DE-AC05-06OR23177. The U.S. Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce this manuscript for U.S. Government purposes.

Theodore Larrieu, Christopher Slominski, Michele Joyce

2011-10-01T23:59:59.000Z

389

Federal Emergency Management Information system (FEMIS) data management guide. Version 1.2  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of FEMIS. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, how it is loaded, and how it is managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Johnson, S.M.; Loveall, R.M.; Winters, C.

1996-05-01T23:59:59.000Z

390

ETD Management in the Texas Digital Library: lessons Learned from a Demonstrator  

E-Print Network [OSTI]

participants. Shiboleth Any web aplication that deals with personal information wil be dealing with authentication and identity management. In an educational seting, these aspects of the aplication are critical, and regulated by federal laws governing... is an open-source midleware aplication for providing identity management in a distributed environment (Shiboleth 208). In suport of its scholarly services, TDL established the first state-wide Shiboleth federation in Texas. Under this infrastructure, TDL...

Mikeal, Adam

2008-07-24T23:59:59.000Z

391

Collod-Broud & Boileau The Marfan Mutation Database  

E-Print Network [OSTI]

Collod-Béroud & Boileau The Marfan Mutation Database Gwenaëlle Collod-Béroud1 and Catherine Boileau created, in 1995, a mutation database named "UMD-FBN1". The database follows the guidelines on mutation databases of the Hugo Mutation Database Initiative and gives access to a software package that provides

Paris-Sud XI, Université de

392

National Spill Test Technology Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

Western Research Institute established, and ACRC continues to maintain, the National Spill Technology database to provide support to the Liquified Gaseous Fuels Spill Test Facility (now called the National HAZMAT Spill Center) as directed by Congress in Section 118(n) of the Superfund Amendments and Reauthorization Act of 1986 (SARA). The Albany County Research Corporation (ACRC) was established to make publicly funded data developed from research projects available to benefit public safety. The founders since 1987 have been investigating the behavior of toxic chemicals that are deliberately or accidentally spilled, educating emergency response organizations, and maintaining funding to conduct the research at the DOEĆs HAZMAT Spill Center (HSC) located on the Nevada Test Site. ACRC also supports DOE in collaborative research and development efforts mandated by Congress in the Clean Air Act Amendments. The data files are results of spill tests conducted at various times by the Silicones Environmental Health and Safety Council (SEHSC) and DOE, ANSUL, Dow Chemical, the Center for Chemical Process Safety (CCPS) and DOE, Lawrence Livermore National Laboratory (LLNL), OSHA, and DOT; DuPont, and the Western Research Institute (WRI), Desert Research Institute (DRI), and EPA. Each test data page contains one executable file for each test in the test series as well as a file named DOC.EXE that contains information documenting the test series. These executable files are actually self-extracting zip files that, when executed, create one or more comma separated value (CSV) text files containing the actual test data or other test information.

Sheesley, David (Western Research Institute)

393

BDDR, a new CEA technological and operating reactor database  

SciTech Connect (OSTI)

The new application BDDR (Reactor database) has been developed at CEA in order to manage nuclear reactors technological and operating data. This application is a knowledge management tool which meets several internal needs: -) to facilitate scenario studies for any set of reactors, e.g. non-proliferation assessments; -) to make core physics studies easier, whatever the reactor design (PWR-Pressurized Water Reactor-, BWR-Boiling Water Reactor-, MAGNOX- Magnesium Oxide reactor-, CANDU - CANada Deuterium Uranium-, FBR - Fast Breeder Reactor -, etc.); -) to preserve the technological data of all reactors (past and present, power generating or experimental, naval propulsion,...) in a unique repository. Within the application database are enclosed location data and operating history data as well as a tree-like structure containing numerous technological data. These data address all kinds of reactors features and components. A few neutronics data are also included (neutrons fluxes). The BDDR application is based on open-source technologies and thin client/server architecture. The software architecture has been made flexible enough to allow for any change. (authors)

Soldevilla, M.; Salmons, S.; Espinosa, B. [CEA-Saclay, CEA/DEN/DANS/DM2S/SERMA, 91191 Gif-sur-Yvette (France); Clanet, M.; Boudin, X. [CEA-Bruyeres-le-Chatel, 91297 Arpajon (France)

2013-07-01T23:59:59.000Z

394

The Impact of Electronic Bibliographic Databases and Electronic Journal Articles on the Scholar's Information-Seeking Behavior and Personal Collection of "Reprints"  

E-Print Network [OSTI]

This article examines the potential changes to the information seeking behavior of scholars and how they manage their own collection of research article “reprints”. With bibliographic databases and electronic journals provided by academic libraries...

McGeachin, Robert B.

2004-01-01T23:59:59.000Z

395

The volatile compound BinBase mass spectral database  

E-Print Network [OSTI]

B, Eriksson R: SuperScent-a database of flavors and scents.Sayaed AM: The Pherobase: Database of Insect Pheromones andA public study design database for metabolomics projects.

Skogerson, Kirsten; Wohlgemuth, Gert; Barupal, Dinesh K; Fiehn, Oliver

2011-01-01T23:59:59.000Z

396

DATE A DAtabase of TIM Barrel 2.1 Introduction......................................................................................  

E-Print Network [OSTI]

24 DATE ­ A DAtabase of TIM Barrel Enzymes 2.1 Introduction...................................................................................... 2.2 Objective and salient features of the database .................................... 2.2.1 Choice on the database............................................... 2.4 Features

Babu, M. Madan

397

Database Structure and Visualization Software for Microbial Physiology Data INTRODUCTION  

E-Print Network [OSTI]

Database Structure and Visualization Software for Microbial Physiology Data INTRODUCTION Nicholas includes database input. Other related information can be entered through the website. The relational structure of the database is responsible for associating related data · A structured query is sent

398

Visiting Database Programmer/Application Developer School of Chemical Sciences  

E-Print Network [OSTI]

Visiting Database Programmer/Application Developer School of Chemical Sciences University professional as Visiting Database Programmer/Application Developer. This position reports to the Information administrative database environment (specifically Oracle and SQL Server). This is a visiting position, but may

Zimmerman, Steven C.

399

SPATIAL DATABASE MODELING WITH PICTOGRAMMIC LANGUAGES Yvan Bdard, Suzie Larrive  

E-Print Network [OSTI]

SPATIAL DATABASE MODELING WITH PICTOGRAMMIC LANGUAGES Yvan Bédard, Suzie Larrivée Dept of Geomatics Sciences Centre for Research in Geomatics Canada NSERC Industrial Research Chair in Geospatial Databases language extension, Spatial data modeling, Perceptory pictograms. DEFINITION "Spatial databases" consist

400

Management Information Systems (MIS) This sheet has sample occupations, work settings, employers, and career development activities associated with this major. Some of these  

E-Print Network [OSTI]

Manager Computer Training Specialist Consultant Database Engineer Database Manager/ Administrator Data for History & Computing - Plainview, TX www.theaahc.org American Society for Cybernetics - Washington, DC www.awc-hq.org For other related professional organizations, go to FSU Libraries database at lib.fsu.edu; select Find

Ronquist, Fredrik

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

US Department of Energy Chernobyl Database  

SciTech Connect (OSTI)

The Chernobyl Database project is developing and maintaining an information to provide researchers with data and resource materials relating to the Chernobyl nuclear accident of April 1986. The system is the official United States repository for Chernobyl data. The system includes a collection of Chernobyl-related documents, a database of bibliographic references, and a collection of radiological measurements records. In addition, projects have been developed to make the resources more accessible and easy to use. These products include a personal-computer-based bibliographic search system (ChernoLit{trademark}), two printed bibliographies, and a personal- computer-based radiological measurements database system (ChernoDat).

Kennedy, R.A.; Mahaffey, J.A.; Smith, S.K.; Carr, F. Jr.

1992-05-01T23:59:59.000Z

402

Managing the History of Metadata in support for DB Archiving and Schema Evolution  

E-Print Network [OSTI]

evolution itself. We use the schema history of the Wikipedia database as a telling example of the many uses systems require a systematic archiving and management of the history of the database. In particular-time history archiving and querying of databases under schema evolution. The first objective is achieved

Zaniolo, Carlo

403

Asynchronous data change notification between database server and accelerator controls system  

SciTech Connect (OSTI)

Database data change notification (DCN) is a commonly used feature. Not all database management systems (DBMS) provide an explicit DCN mechanism. Even for those DBMS's which support DCN (such as Oracle and MS SQL server), some server side and/or client side programming may be required to make the DCN system work. This makes the setup of DCN between database server and interested clients tedious and time consuming. In accelerator control systems, there are many well established software client/server architectures (such as CDEV, EPICS, and ADO) that can be used to implement data reflection servers that transfer data asynchronously to any client using the standard SET/GET API. This paper describes a method for using such a data reflection server to set up asynchronous DCN (ADCN) between a DBMS and clients. This method works well for all DBMS systems which provide database trigger functionality. Asynchronous data change notification (ADCN) between database server and clients can be realized by combining the use of a database trigger mechanism, which is supported by major DBMS systems, with server processes that use client/server software architectures that are familiar in the accelerator controls community (such as EPICS, CDEV or ADO). This approach makes the ADCN system easy to set up and integrate into an accelerator controls system. Several ADCN systems have been set up and used in the RHIC-AGS controls system.

Fu, W.; Morris, J.; Nemesure, S.

2011-10-10T23:59:59.000Z

404

A Database for Reviewing and Selecting Radioactive Waste Treatment Technologies and Vendors  

SciTech Connect (OSTI)

Several attempts have been made in past years to collate and present waste management technologies and solutions to waste generators. These efforts have been manifested as reports, buyers’ guides, and databases. While this information is helpful at the time it is assembled, their principal weakness is maintaining the timeliness and accuracy of the information over time. In many cases, updates have to be published or developed as soon as the product is disseminated. The recently developed National Low-Level Waste Management Program’s Technologies Database is a vendor-updated Internet based database designed to overcome this problem. The National Low-Level Waste Management Program’s Technologies Database contains information about waste types, treatment technologies, and vendor information. Information is presented about waste types, typical treatments, and the vendors who provide those treatment methods. The vendors who provide services update their own contact information, their treatment processes, and the types of wastes for which their treatment process is applicable. This information is queriable by a generator of low-level or mixed low-level radioactive waste who is seeking information on waste treatment methods and the vendors who provide them. Timeliness of the information in the database is assured using time clocks and automated messaging to remind featured vendors to keep their information current. Failure to keep the entries current results in a vendor being warned and then ultimately dropped from the database. This assures that the user is dealing with the most current information available and the vendors who are active in reaching and serving their market.

Schwinkendorf, William Erich; Marushia, Patrick Charles

1999-07-01T23:59:59.000Z

405

Attributes for Causal Inference in Electronic Healthcare Databases Jenna Reps, Jonathan M. Garibaldi,  

E-Print Network [OSTI]

Attributes for Causal Inference in Electronic Healthcare Databases Jenna Reps, Jonathan M Spontaneous Reporting System (SRS) databases and Electronic Healthcare Databases (EHDs) are the databases

Aickelin, Uwe

406

An Infrared Spectral Database for Detection of Gases Emitted...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Database for Detection of Gases Emitted by Biomass Burning. An Infrared Spectral Database for Detection of Gases Emitted by Biomass Burning. Abstract: We report the construction of...

407

AVTA: 2012 Chevrolet Volt PHEV Downloadable Dynamometer Database...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Chevrolet Volt PHEV Downloadable Dynamometer Database Reports AVTA: 2012 Chevrolet Volt PHEV Downloadable Dynamometer Database Reports The Vehicle Technologies Office's Advanced...

408

AVTA: 2012 Toyota Prius PHEV Downloadable Dynamometer Database...  

Energy Savers [EERE]

Toyota Prius PHEV Downloadable Dynamometer Database Reports AVTA: 2012 Toyota Prius PHEV Downloadable Dynamometer Database Reports The Vehicle Technologies Office's Advanced...

409

AVTA: 2010 Honda CR-Z Hybrid Downloadable Dynamometer Database...  

Energy Savers [EERE]

CR-Z Hybrid Downloadable Dynamometer Database Reports AVTA: 2010 Honda CR-Z Hybrid Downloadable Dynamometer Database Reports The Vehicle Technologies Office's Advanced Vehicle...

410

Database (Report) of U.S. CHP Installations Incorporating Thermal...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Database (Report) of U.S. CHP Installations Incorporating Thermal Energy Storage (TES) andor Turbine Inlet Cooling (TIC), 2004 Database (Report) of U.S. CHP Installations...

411

Heat Flow Database Expansion for NGDS Data Development, Collection...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Heat Flow Database Expansion for NGDS Data Development, Collection and Maintenance (SMU) Heat Flow Database Expansion for NGDS Data Development, Collection and Maintenance (SMU)...

412

Fault-tolerant distributed transactions for partitioned OLTP databases  

E-Print Network [OSTI]

This thesis presents Dtxn, a fault-tolerant distributed transaction system designed specifically for building online transaction processing (OLTP) databases. Databases have traditionally been designed as general purpose ...

Jones, Evan P. C. (Evan Philip Charles), 1981-

2012-01-01T23:59:59.000Z

413

The Tariff Analysis Project: A Database and Analysis Platform...  

Open Energy Info (EERE)

Tariff Analysis Project: A Database and Analysis Platform for Electricity Tariffs Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Tariff Analysis Project: A Database...

414

EM Develops Database for Efficient Solutions to Nuclear Cleanup...  

Broader source: Energy.gov (indexed) [DOE]

illustrate the benefits of the database. EM also shared the database with the UK's Nuclear Decommissioning Authority and the Canadian Nuclear Laboratories to identify remote...

415

Hospitality Management Hospitality Management  

E-Print Network [OSTI]

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

416

The LBNL Water Heater Retail Price Database  

E-Print Network [OSTI]

Olson, and Stuart Chaitkin (LBNL). We also want to thank ourand Mithra Moezzi, also of LBNL. This work was supported byLBNL – 44749 The LBNL Water Heater Retail Price Database

Lekov, Alex; Glover, Julie; Lutz, Jim

2000-01-01T23:59:59.000Z

417

IFDB: Decentralized Information Flow Control for Databases  

E-Print Network [OSTI]

Numerous sensitive databases are breached every year due to bugs in applications. These applications typically handle data for many users, and consequently, they have access to large amounts of confidential information.

Schultz, David

418

6.893 Database Systems, Fall 2004  

E-Print Network [OSTI]

This course is designed to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, query optimization, query processing, and transactions. This ...

Madden, Samuel R. (Samuel Ross), 1976-

419

GWIDD: Genome-wide protein docking database  

E-Print Network [OSTI]

Structural information on interacting proteins is important for understanding life processes at the molecular level. Genome-wide docking database is an integrated resource for structural studies of protein–protein interactions on the genome scale...

Kundrotas, Petras J.; Zhu, Zhengwei; Vasker, Ilya A.

2009-11-09T23:59:59.000Z

420

Enabling Geographical Queries to a Botanical Database   

E-Print Network [OSTI]

Conservation of the lowland savanna ecosystem in Belize Project (Defra 17-022) has created a database of savanna plant collections in the country. Some of the collections have accurate positional coordinates measured by GPS devices while the others...

Sato, Go

2011-11-25T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Energy Citations Database (ECD) - Alerts Comments  

Office of Scientific and Technical Information (OSTI)

Alerts Comments If you have a question about Energy Citations Database Alerts, we recommend you check frequently asked questions. If your question still has not been answered or if...

422

Proposal for a High Energy Nuclear Database  

E-Print Network [OSTI]

Proposal for a High Energy Nuclear Database David A. Brown 1it requires the high-energy nuclear physics com- munity’s ?compilations of high-energy nuclear data for applications

Brown, David A.; Vogt, Ramona

2005-01-01T23:59:59.000Z

423

Towards Privacy Preserving of Forensic DNA Databases  

E-Print Network [OSTI]

Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user's query and the DNA database need to be extracted. However, unrelated profiles cannot be revealed to each other...

Liu, Sanmin

2012-02-14T23:59:59.000Z

424

Concentrations of indoor pollutants database: User's manual  

SciTech Connect (OSTI)

This manual describes the computer-based database on indoor air pollutants. This comprehensive database alloys helps utility personnel perform rapid searches on literature related to indoor air pollutants. Besides general information, it provides guidance for finding specific information on concentrations of indoor air pollutants. The manual includes information on installing and using the database as well as a tutorial to assist the user in becoming familiar with the procedures involved in doing bibliographic and summary section searches. The manual demonstrates how to search for information by going through a series of questions that provide search parameters such as pollutants type, year, building type, keywords (from a specific list), country, geographic region, author's last name, and title. As more and more parameters are specified, the list of references found in the data search becomes smaller and more specific to the user's needs. Appendixes list types of information that can be input into the database when making a request. The CIP database allows individual utilities to obtain information on indoor air quality based on building types and other factors in their own service territory. This information is useful for utilities with concerns about indoor air quality and the control of indoor air pollutants. The CIP database itself is distributed by the Electric Power Software Center and runs on IBM PC-compatible computers.

Not Available

1992-05-01T23:59:59.000Z

425

DIP: The Database of Interacting Proteins  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The DIP Database catalogs experimentally determined interactions between proteins. It combines information from a variety of sources to create a single, consistent set of protein-protein interactions. By interaction, the DIP Database creators mean that two amino acid chains were experimentally identified to bind to each other. The database lists such pairs to aid those studying a particular protein-protein interaction but also those investigating entire regulatory and signaling pathways as well as those studying the organisation and complexity of the protein interaction network at the cellular level. The data stored within the DIP database were curated, both, manually by expert curators and also automatically using computational approaches that utilize the knowledge about the protein-protein interaction networks extracted from the most reliable, core subset of the DIP data. It is a relational database that can be searched by protein, sequence, motif, article information, and pathBLAST. The website also serves as an access point to a number of projects related to DIP, such as LiveDIP, The Database of Ligand-Receptor Partners (DLRP) and JDIP. Users have free and open access to DIP after login. [Taken from the DIP Guide and the DIP website] (Specialized Interface) (Registration Required)

426

Development of the downhole dynamometer database  

SciTech Connect (OSTI)

The Downhole Dynamometer Database is a compilation of test data collected with a set of five downhole tools built by Albert Engineering under contract to Sandia National Laboratories. The downhole dynamometer tools are memory tools deployed in the sucker rod string with sensors to measure pressure, temperature, load, and acceleration. The acceleration data is processed to yield position, so that a load vs. position dynagraph can be generated using data collected downhole. With five tools in the hole at one time, all measured data and computed dynagraphs from five different positions in the rod string are available. The purpose of the Database is to provide industry with a complete and high quality measurement of downhole sucker rod pumping dynamics. To facilitate use of the database, Sandia has developed a Microsoft Windows-based interface that functions as a visualizer and browser to the more than 40 MBytes of data. The interface also includes a data export feature to allow users to extract data from the database for use in their own programs. This paper includes a description of the downhole dynamometer tools, data collection program, database content, and a few illustrations of the data contained in the downhole dynamometer database.

Waggoner, J.R.; Mansure, A.

1997-02-01T23:59:59.000Z

427

Proposal for a High Energy Nuclear Database  

SciTech Connect (OSTI)

We propose to develop a high-energy heavy-ion experimental database and make it accessible to the scientific community through an on-line interface. This database will be searchable and cross-indexed with relevant publications, including published detector descriptions. Since this database will be a community resource, it requires the high-energy nuclear physics community's financial and manpower support. This database should eventually contain all published data from Bevalac and AGS to RHIC to CERN-LHC energies, proton-proton to nucleus-nucleus collisions as well as other relevant systems, and all measured observables. Such a database would have tremendous scientific payoff as it makes systematic studies easier and allows simpler benchmarking of theoretical models to a broad range of old and new experiments. Furthermore, there is a growing need for compilations of high-energy nuclear data for applications including stockpile stewardship, technology development for inertial confinement fusion and target and source development for upcoming facilities such as the Next Linear Collider. To enhance the utility of this database, we propose periodically performing evaluations of the data and summarizing the results in topical reviews.

Brown, David A.; Vogt, Ramona

2005-03-31T23:59:59.000Z

428

NATIONAL CARBON SEQUESTRATION DATABASE AND GEOGRAPHIC INFORMATION SYSTEM (NATCARB) FORMER TITLE-MIDCONTINENT INTERACTIVE DIGITAL CARBON ATLAS AND RELATIONAL DATABASE (MIDCARB)  

SciTech Connect (OSTI)

This annual report describes progress in the third year of the three-year project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. The project assembled a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide (CO{sub 2}) geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project has been extended and expanded as a ''NATional CARBon Sequestration Database and Geographic Information System (NATCARB)'' to provide national coverage across the Regional CO{sub 2} Partnerships, which currently cover 40 states (http://www.natcarb.org). Advanced distributed computing solutions link database servers across the five states and other publicly accessible servers (e.g., USGS) into a single system where data is maintained and enhanced at the local level but is accessed and assembled through a single Web portal and can be queried, assembled, analyzed and displayed. This project has improved the flow of data across servers and increased the amount and quality of available digital data. The online tools used in the project have improved in stability and speed in order to provide real-time display and analysis of CO{sub 2} sequestration data. The move away from direct database access to web access through eXtensible Markup Language (XML) has increased stability and security while decreasing management overhead. The MIDCARB viewer has been simplified to provide improved display and organization of the more than 125 layers and data tables that have been generated as part of the project. The MIDCARB project is a functional demonstration of distributed management of data systems that cross the boundaries between institutions and geographic areas. The MIDCARB system addresses CO{sub 2} sequestration and other natural resource issues from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

Timothy R. Carr

2004-07-16T23:59:59.000Z

429

The design of the computer-human interface of integrated resource management automation (IRMA)  

E-Print Network [OSTI]

, consistent user interface ~ use of a mouse as the primary pointing device'4 Database Management System (DBMS). The DBMS is the second most important module, next to the UIS, of IRMA. All data stored in the database is accessed through the DBMS.... The database contains all the tabular, spatial header, and system control information. All of the modules in IRMA can request information from the database through the DBMS. This communication is processed through the Dynamic Data Exchange (DDE) protocol...

Holtfrerich, David Russell

1991-01-01T23:59:59.000Z

430

Triggers on Database Histories A. Prasad Sistla Ouri Wolfson  

E-Print Network [OSTI]

Triggers on Database Histories A. Prasad Sistla Ouri Wolfson Department of Electrical Engineering of the database state over time (i.e. the database history). For example, in securities trading, the system may to the database history. The following temporal trigger is one such example--- the value of attribute A increases

Wolfson, Ouri E.

431

Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan  

E-Print Network [OSTI]

Overall Structure History of Database Systems #12;©Silberschatz, Korth and Sudarshan1.3Database SystemDatabase System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www, Korth and Sudarshan1.2Database System Concepts - 5th Edition, May 23, 2005 Chapter 1: Introduction

Dragan, Feodor F.

432

MARS CLIMATE DATABASE v5.1 USER MANUAL  

E-Print Network [OSTI]

MARS CLIMATE DATABASE v5.1 USER MANUAL (ESTEC Contract 11369/95/NL/JG "Mars Climate Database for version 5.1 of the Mars Climate Database (MCD) de- veloped by LMD (Paris), AOPP (Oxford), Dept. Physics and the Centre National d'Etudes Spatiales. This is a database of atmospheric statistics compiled from Global Cli

Spiga, Aymeric

433

October 6, 1997 ITER L-Mode Con nement Database  

E-Print Network [OSTI]

October 6, 1997 ITER L-Mode Con nement Database S.M. Kaye and the ITER Con nement Database Working Group Abstract This paper describes the content of an L-mode database that has been compiled with data, and Tore-Supra. The database consists of a total of 2938 entries, 1881 of which are in the L-phase while

434

Data Preparation Process for the Buildings Performance Database  

E-Print Network [OSTI]

LBNL-6724E Data Preparation Process for the Buildings Performance Database Claudine Y. Custodio Performance Database (BPD) includes empirically measured data from a variety of data sources with varying data quality within the database and to ensure that all database entries have sufficient data

435

A Database of Invariant Rings Gregor Kemper, Elmar K  

E-Print Network [OSTI]

A Database of Invariant Rings Gregor Kemper, Elmar K Ë? ording, Gunter Malle, B. Heinrich Matzat, Denis Vogel, and Gabor Wiese CONTENTS 1. Introduction 2. Concepts of the Database 3. An Example Session/8­2 (``Invariantentheorie endlicher Gruppen''). We announce the creation of a database of invariant rings. This database

Malle, Gunter

436

Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan  

E-Print Network [OSTI]

Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www.db-book.com for conditions on re-use Chapter 7: Relational Database DesignChapter 7: Relational Database Design #12;©Silberschatz, Korth and Sudarshan7.2Database System Concepts - 5th Edition, Oct 5, 2006 Chapter 7: Relational

Dragan, Feodor F.

437

Insights from the downhole dynamometer database  

SciTech Connect (OSTI)

The Downhole Dynamometer Database is a compilation of test data collected with a set of five downhole tools built by Albert Engineering under contract to Sandia National Laboratories. The downhole dynamometer tools are memory tools deployed in the sucker rod string with sensors to measure pressure, temperature, load, and acceleration. The acceleration data is processed to yield position, so that a load vs. position dynagraph can be generated using data collected downhole. With five tools in the hole at one time, all measured data and computed dynagraphs from five different positions in the rod string are available. The purpose of the Database is to provide industry with a complete and high quality measurement of downhole sucker rod pumping dynamics. To facilitate use of the database, Sandia has developed a Microsoft Windows-based interface that functions as a visualizer and browser to the more than 40 MBytes of data. The interface also includes a data export feature to allow users to extract data from the database for use in their own programs. Following a brief description of the downhole dynamometer tools, data collection program, and database content, this paper will illustrate a few of the interesting and unique insights gained from the downhole data.

Waggoner, J.R.

1997-03-01T23:59:59.000Z

438

March 23, 2008 Databases: Practical DB Design 1 Practical Database Design  

E-Print Network [OSTI]

approach towards development of information system, called, Information System Development Life Cycle. #12 of Information Systems in Organizations + Why Organizations Use DB Systems + Information System Life Cycle System Life Cycle ... Database DBMS Users Users #12;March 23, 2008 Databases: Practical DB Design 8

Adam, Salah

439

Energy Savings Through Steam Trap Management  

E-Print Network [OSTI]

Energy Savings through Steam Trap Management Chris Gibbs, Account Manager, Armstrong International, Inc., Three Rivers, MI ESL-IE-08-05-08 Proceedings from theThirtieth Industrial Energy Technology Conference...-based steam trap management application developed by Armstrong International. The application calculates steam loss, fuel loss, dollar loss and CO 2 emission generation. The database allows for trend analysis, automatic energy report generation...

Gibbs, C.

2008-01-01T23:59:59.000Z

440

Mining Software Usage with the Automatic Library Tracking Database (ALTD)  

SciTech Connect (OSTI)

Tracking software usage is important for HPC centers, computer vendors, code developers and funding agencies to provide more efficient and targeted software support, and to forecast needs and guide HPC software effort towards the Exascale era. However, accurately tracking software usage on HPC systems has been a challenging task. In this paper, we present a tool called Automatic Library Tracking Database (ALTD) that has been developed and put in production on several Cray systems. The ALTD infrastructure prototype automatically and transparently stores information about libraries linked into an application at compilation time and also the executables launched in a batch job. We will illustrate the usage of libraries, compilers and third party software applications on a system managed by the National Institute for Computational Sciences.

Hadri, Bilel [ORNL; Fahey, Mark R [ORNL

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Designing a future Conditions Database based on LHC experience  

E-Print Network [OSTI]

The ATLAS and CMS Conditions Database infrastructures have served each of the respective experiments well through LHC Run 1, providing efficient access to a wide variety of conditions information needed in online data taking and offline processing and analysis. During the long shutdown between Run 1 and Run 2, we have taken various measures to improve our systems for Run 2. In some cases, a drastic change was not possible because of the relatively short time scale to prepare for Run 2. In this process, and in the process of comparing to the systems used by other experiments, we realized that for Run 3, we should consider more fundamental changes and possibilities. We seek changes which would streamline conditions data management, improve monitoring tools, better integrate the use of metadata, incorporate analytics to better understand conditions usage, as well as investigate fundamental changes in the storage technology, which might be more efficient while minimizing maintenance of the data as well as simplif...

Formica, Andrea; The ATLAS collaboration; Gallas, Elizabeth; Govi, Giacomo; Lehmann Miotto, Giovanna; Pfeiffer, Andreas

2015-01-01T23:59:59.000Z

442

ITER L-Mode Confinement Database  

SciTech Connect (OSTI)

This paper describes the content of an L-mode database that has been compiled with data from Alcator C-Mod, ASDEX, DIII, DIII-D, FTU, JET, JFT-2M, JT-60, PBX-M, PDX, T-10, TEXTOR, TFTR, and Tore-Supra. The database consists of a total of 2938 entries, 1881 of which are in the L-phase while 922 are ohmically heated (OH) only. Each entry contains up to 95 descriptive parameters, including global and kinetic information, machine conditioning, and configuration. The paper presents a description of the database and the variables contained therein, and it also presents global and thermal scalings along with predictions for ITER. The L-mode thermal confinement time scaling was determined from a subset of 1312 entries for which the thermal confinement time scaling was provided.

S.M. Kaye and the ITER Confinement Database Working Group

1997-10-01T23:59:59.000Z

443

The JANA Calibrations and Conditions Database API  

SciTech Connect (OSTI)

Calibrations and conditions databases can be accessed from within the JANA Event Processing framework through the API defined in its JCalibration base class. The API is designed to support everything from databases, to web services to flat files for the backend. A Web Service backend using the gSOAP toolkit has been implemented which is particularly interesting since it addresses many modern cybersecurity issues including support for SSL. The API allows constants to be retrieved through a single line of C++ code with most of the context, including the transport mechanism, being implied by the run currently being analyzed and the environment relieving developers from implementing such details.

David Lawrence

2010-07-01T23:59:59.000Z

444

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

445

Constructing a database of cryptographically strong elliptic curves  

E-Print Network [OSTI]

or GCM; a keyed hash function, also known as a message authentication code (MAC); a key exchange system Recherche "Informatique des Systèmes Communicants Sécurisés" Ecole Supérieure d'Ingénieurs de Luminy Parc

Provence Aix-Marseille I, Université de

446

Qunits: queried units in database search  

E-Print Network [OSTI]

Keyword search against structured databases has become a popular topic of investigation, since many users find structured queries too hard to express, and enjoy the freedom of a ``Google-like'' query box into which search terms can be entered. Attempts to address this problem face a fundamental dilemma. Database querying is based on the logic of predicate evaluation, with a precisely defined answer set for a given query. On the other hand, in an information retrieval approach, ranked query results have long been accepted as far superior to results based on boolean query evaluation. As a consequence, when keyword queries are attempted against databases, relatively ad-hoc ranking mechanisms are invented (if ranking is used at all), and there is little leverage from the large body of IR literature regarding how to rank query results. Our proposal is to create a clear separation between ranking and database querying. This divides the problem into two parts, and allows us to address these separately. The first tas...

Nandi, Arnab

2009-01-01T23:59:59.000Z

447

CEBAF Large Acceptance Spectrometer (CLAS) Physics Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

A username and password are required to access and search the entire database. However, the Overview page provides links to detailed data pages for each of the experiments available for public access. There are many experiments with data that the public can freely access.

448

Capturing Database Transformations for Big Data Analytics  

E-Print Network [OSTI]

of Houston DBMS #12;Organization · Introduction · Classification · Program · Case Study · Conclusions DBMS Transformations to Build Data Sets for Data Mining, Data & Knowledge Engineering (DKE), 2014, Elsevier. DBMS #12 for this project might remain in the database, using resources. DBMS #12;Motivation: Saving Work · Different users

Ordonez, Carlos

449

Knowledge Discovery in Spatial Databases Martin Ester  

E-Print Network [OSTI]

and their interactions with each other. Most companies, governmental agencies and scientific organizations use DBMS with ex­ isting DBMS. Thus, the second goal is to propose methods of efficiently supporting spatial data mining algorithms by a DBMS. Our approach centers around a new set of database primitives for mining

Ester, Martin

450

Exam revision Database Systems Lecture 18  

E-Print Network [OSTI]

revision Example (coursework 5) · {Film} {Certificate} is a non-trivial functional dependency · {Cinema(A,B,C), candidate keys (A,B) and (A,C), fd B C. #12;Exam revision Example (coursework 5) · Relation ListingExam revision Database Systems Lecture 18 Natasha Alechina #12;Exam revision In This Lecture · Exam

Alechina, Natasha

451

Exam revision Database Systems Lecture 18  

E-Print Network [OSTI]

,B) and (A,C), fd B C. #12;3 Exam revision Example (coursework 5) · Relation Listing is not in 2NF because1 Exam revision Database Systems Lecture 18 Natasha Alechina Exam revision In This Lecture · Exam format · Main topics · How to revise Exam revision Exam format · Answer three questions out of five

Alechina, Natasha

452

Hypercat : A Database for extragalactic astronomy  

E-Print Network [OSTI]

The Hypercat Database is developed at Observatoire de Lyon and is distributed on the WEB through different mirrors in Europe. The goal of Hypercat is to gather data necessary for studying the evolution of galaxies (dynamics and stellar contains) and particularly for providing a z=0 reference for these studies.

Ph. Prugniel; G. Maubon

1999-10-01T23:59:59.000Z

453

Interactive Database Access with Statistics and Graphics  

E-Print Network [OSTI]

DbAccess The Manual Interactive Database Access with Statistics and Graphics Version 2.1.1 D. M and graphical needs of NSTX Physicists. Flexible views and joins are possible, including options for complex SQL General Atomics (GA Plot Objects) adds extensive graphical and interactive capabilities (and documentation

Princeton Plasma Physics Laboratory

454

Proc. 4th RADC Workshop on Multilevel Database Security, Rhode Island, April 1991, pages 122-126.  

E-Print Network [OSTI]

22030-4444 1 INTRODUCTION A database management system DBMS is a superb tool for building e ective infor- mation systems. The widespread use of DBMS's across the board, from stand-alone personal computers at one and acceptance of this technology. It is therefore no surprise that there is signi cant interest in trusted DBMS

Sandhu, Ravi

455

Community Connections Database (CCDB)Community Connections Database (CCDB) Instructions for Students (CSL-4S)Instructions for Students (CSL-4S)  

E-Print Network [OSTI]

Community Connections Database (CCDB)Community Connections Database (CCDB) Instructions for Students (CSL-4S)Instructions for Students (CSL-4S) The Community Connections Database (CCDB) allows Connections Database (CCDB) allows students to search for community service learning opportunities

456

Metadata Modeling for Quality of Service Management in Distributed Multimedia Systems1  

E-Print Network [OSTI]

Metadata Modeling for Quality of Service Management in Distributed Multimedia Systems1 Brigitte information delivery. For that purpose, Quality of Service (QoS) management appears as an essential function of a system database that stores and manages the metadata required for QoS management. We have created

von Bochmann, Gregor

457

Network Management Network Management  

E-Print Network [OSTI]

that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

458

Optimizing database-backed applications with query synthesis  

E-Print Network [OSTI]

Object-relational mapping libraries are a popular way for applications to interact with databases because they provide transparent access to the database using the same language as the application. Unfortunately, using ...

Cheung, Alvin K.

459

NOAA Atlas NESDIS 72 WORLD OCEAN DATABASE 2013  

E-Print Network [OSTI]

NOAA Atlas NESDIS 72 WORLD OCEAN DATABASE 2013 Timothy P. Boyer, John I. Antonov, Olga K. Baranova, World Ocean Database 2013. Sydney Levitus, Ed.; Alexey Mishonov, Technical Ed.; NOAA Atlas NESDIS 72........................................................................................................... 14 1.1.1. History

460

Human sciences The human sciences database contains approximately 254 academic  

E-Print Network [OSTI]

Human sciences The human sciences database contains approximately 254 academic journals and statistical reports on the following subjects: (comparative literature, theology, history and geography, education, psychology, arts, languages and Library Science) Social sciences The social sciences database

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Novel applications of data mining methodologies to incident databases  

E-Print Network [OSTI]

Incident databases provide an excellent opportunity to study the repeated situations of incidents in the process industry. The databases give an insight into the situation which led to an incident, and if studied properly can help monitor...

Anand, Sumit

2006-08-16T23:59:59.000Z

462

Fear and desire in systems design : negotiating database usefulness  

E-Print Network [OSTI]

Databases are ubiquitous. They are used for a host of functions including coordination, decision making, and memory archiving. Despite their importance and ubiquity, databases continue to frustrate us, often departing from ...

Agrawal, Tanu

2008-01-01T23:59:59.000Z

463

Query execution in column-oriented database systems  

E-Print Network [OSTI]

There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations ...

Abadi, Daniel J

2008-01-01T23:59:59.000Z

464

Query-based database policy assurance using semantic web technologies  

E-Print Network [OSTI]

In this thesis, we present a novel approach to database security which looks at queries instead of the database tables themselves. In doing so, we use a number of Semantic Web technologies to define rules, translate queries, ...

Soltren, José Hiram

2009-01-01T23:59:59.000Z

465

DAPS: Database of Aligned Protein Structures  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

How is DAPS constructed? We begin with the set of all chains from the current release of the PDB. An all on all search is done on the list to find pairs that have the same fold acoording to both the FSSP and CATH databases and clustered into groups by a representative structure (representative structures have less than 25% sequence identity to each other). For each protein pair, regions aligned by the DALI program are extracted from the corresponding FSSP file, or recomputed using DALI-lite. In domain DAPS, only regions that are called "domains" by CATH are included in the alignment. The amino acid type, secondary structure type, and solvent accessibility are extracted from the DSSP file and written pairwise into the database. DAPS is updated with updates of CATH.[Taken from http://nihserver.mbi.ucla.edu/DAPS/daps_help.html

Mallick, Parag; Rice, Danny; Eisenberg, David

466

Rocky Mountain Basins Produced Water Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

Historical records for produced water data were collected from multiple sources, including Amoco, British Petroleum, Anadarko Petroleum Corporation, United States Geological Survey (USGS), Wyoming Oil and Gas Commission (WOGC), Denver Earth Resources Library (DERL), Bill Barrett Corporation, Stone Energy, and other operators. In addition, 86 new samples were collected during the summers of 2003 and 2004 from the following areas: Waltman-Cave Gulch, Pinedale, Tablerock and Wild Rose. Samples were tested for standard seven component "Stiff analyses", and strontium and oxygen isotopes. 16,035 analyses were winnowed to 8028 unique records for 3276 wells after a data screening process was completed. [Copied from the Readme document in the zipped file available at http://www.netl.doe.gov/technologies/oil-gas/Software/database.html] Save the Zipped file to your PC. When opened, it will contain four versions of the database: ACCESS, EXCEL, DBF, and CSV formats. The information consists of detailed water analyses from basins in the Rocky Mountain region.

467

REALTIME DATABASE SYSTEMS: ARCHITECTURE AND TECHNIQUES  

E-Print Network [OSTI]

monitoring 175 13.3 ECA rule extended with temporal attributes 178 13.4 Response time in a real­time system using ECA paradigm. 182 14.1 A Real Time Database System 188 14.2 Maximum Age (MA) and Unapplied Update (UU) 192 14.3 Inter­arrival distribution of the stock price updates of G.E. on 94/1/3. 194 14

Ramamritham, Krithi

468

Accelerating semantic graph databases on commodity clusters  

SciTech Connect (OSTI)

We are developing a full software system for accelerating semantic graph databases on commodity cluster that scales to hundreds of nodes while maintaining constant query throughput. Our framework comprises a SPARQL to C++ compiler, a library of parallel graph methods and a custom multithreaded runtime layer, which provides a Partitioned Global Address Space (PGAS) programming model with fork/join parallelism and automatic load balancing over a commodity clusters. We present preliminary results for the compiler and for the runtime.

Morari, Alessandro; Castellana, Vito G.; Haglin, David J.; Feo, John T.; Weaver, Jesse R.; Tumeo, Antonino; Villa, Oreste

2013-10-06T23:59:59.000Z

469

Preparing a public database of radio sources  

E-Print Network [OSTI]

We have collected the largest existing set of radio source lists in machine-readable form: 320 tables with 1.75 million records. Only a minor fraction of these is accessible via public databases. We describe our plans to make this huge amount of heterogeneous data accessible in a homogeneous way via the World Wide Web, with reliable cross-identifications, and searchable by various observables.

H. Andernach; S. A. Trushkin; A. G. Gubanov; O. V. Verkhodanov; V. B. Titov; A. Micol

1996-07-22T23:59:59.000Z

470

Nama Database Wiki | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3Informationof Energy Calculator29 JumpNama Database Wiki Jump

471

National Solar Radiation Database | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3InformationofServices TMS Inc | OpenInformationDatabase, or

472

International Forest Policy Database | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (bot load)International Association ofInternationalPolicy Database

473

Sequence modelling and an extensible data model for genomic database  

SciTech Connect (OSTI)

The Human Genome Project (HGP) plans to sequence the human genome by the beginning of the next century. It will generate DNA sequences of more than 10 billion bases and complex marker sequences (maps) of more than 100 million markers. All of these information will be stored in database management systems (DBMSs). However, existing data models do not have the abstraction mechanism for modelling sequences and existing DBMS's do not have operations for complex sequences. This work addresses the problem of sequence modelling in the context of the HGP and the more general problem of an extensible object data model that can incorporate the sequence model as well as existing and future data constructs and operators. First, we proposed a general sequence model that is application and implementation independent. This model is used to capture the sequence information found in the HGP at the conceptual level. In addition, abstract and biological sequence operators are defined for manipulating the modelled sequences. Second, we combined many features of semantic and object oriented data models into an extensible framework, which we called the Extensible Object Model'', to address the need of a modelling framework for incorporating the sequence data model with other types of data constructs and operators. This framework is based on the conceptual separation between constructors and constraints. We then used this modelling framework to integrate the constructs for the conceptual sequence model. The Extensible Object Model is also defined with a graphical representation, which is useful as a tool for database designers. Finally, we defined a query language to support this model and implement the query processor to demonstrate the feasibility of the extensible framework and the usefulness of the conceptual sequence model.

Li, Peter Wei-Der (California Univ., San Francisco, CA (United States) Lawrence Berkeley Lab., CA (United States))

1992-01-01T23:59:59.000Z

474

Sequence modelling and an extensible data model for genomic database  

SciTech Connect (OSTI)

The Human Genome Project (HGP) plans to sequence the human genome by the beginning of the next century. It will generate DNA sequences of more than 10 billion bases and complex marker sequences (maps) of more than 100 million markers. All of these information will be stored in database management systems (DBMSs). However, existing data models do not have the abstraction mechanism for modelling sequences and existing DBMS`s do not have operations for complex sequences. This work addresses the problem of sequence modelling in the context of the HGP and the more general problem of an extensible object data model that can incorporate the sequence model as well as existing and future data constructs and operators. First, we proposed a general sequence model that is application and implementation independent. This model is used to capture the sequence information found in the HGP at the conceptual level. In addition, abstract and biological sequence operators are defined for manipulating the modelled sequences. Second, we combined many features of semantic and object oriented data models into an extensible framework, which we called the ``Extensible Object Model``, to address the need of a modelling framework for incorporating the sequence data model with other types of data constructs and operators. This framework is based on the conceptual separation between constructors and constraints. We then used this modelling framework to integrate the constructs for the conceptual sequence model. The Extensible Object Model is also defined with a graphical representation, which is useful as a tool for database designers. Finally, we defined a query language to support this model and implement the query processor to demonstrate the feasibility of the extensible framework and the usefulness of the conceptual sequence model.

Li, Peter Wei-Der [California Univ., San Francisco, CA (United States); [Lawrence Berkeley Lab., CA (United States)

1992-01-01T23:59:59.000Z

475

A database for the study of marine mammal behavior: Gap analysis, data standardization, and future directions  

E-Print Network [OSTI]

directly for copies of the database and bib- liography. RCommunication _____________ A Database for the Study ofAbstract—A relational database that contained published

Shaffer, S A; Costa, Daniel P

2006-01-01T23:59:59.000Z

476

THERMODYNAMIC TABLES FOR NUCLEAR WASTE ISOLATION, V.1: AQUEOUS SOLUTIONS DATABASE  

E-Print Network [OSTI]

Vol. I. Aq~leous Solutions Database D L S.1,. Philiips, F.V.Vol 1. Aqueous Solutions Database Sidney L. Phillips, FrankDatabase ..

Phillips, S.L.; Hale, F.V.; Silvester, L.F.

2008-01-01T23:59:59.000Z

477

Reliable and Adaptable Security Engineering for Database-Web Services  

E-Print Network [OSTI]

Reliable and Adaptable Security Engineering for Database-Web Services Martin Wimmer , Daniela,ehrnlech}@db.fmi.uni-passau.de Abstract. The situation in engineering security for Web services that access databases is as follows of sophisticated access control concepts for e-services. When engineering Web services that depend on databases

Kemper, Alfons

478

LESSONS LEARNED AND BEST PRACTICES DATABASE USER MANUAL  

E-Print Network [OSTI]

LESSONS LEARNED AND BEST PRACTICES DATABASE USER MANUAL OIA-OCA-0002, Rev. 0 Effective Date: June Lessons Learned and Best Practices Database User Manual RECORD OF REVISION Revision Number Date Approved.............................................................. 26 #12;OIA-OCA-0002, Rev. 0 Page 4 of 26 Lessons Learned and Best Practices Database User Manual 1

479

Handling Database Updates in Two-dimensional Temporal Logic  

E-Print Network [OSTI]

describing the history of the world, the database system can also execute temporal speci cations in the form a reference point or a reference time. If we apply these concepts to the description of databases, the history the history of the world (database), and action is to be executed upon the world in the present or future time

Finger, Marcelo

480

Analysing the Entire Wikipedia History with Database Supported Haskell  

E-Print Network [OSTI]

Analysing the Entire Wikipedia History with Database Supported Haskell George Giorgidze1 , Torsten the entire Wikipedia history. DSH is a novel high-level database query facility allowing for the for on our experience of using Database Supported Haskell (DSH) [4] for analysing the entire history

Grust, Torsten

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Temporal Conditions and Integrity Constraints in Active Database Systems \\Lambda  

E-Print Network [OSTI]

database history. The evaluation algorithm is also an add­on component, executed on top of, and usingTemporal Conditions and Integrity Constraints in Active Database Systems \\Lambda A. Prasad Sistla, for specifying conditions and events in the rules for active database sys­ tem. This language permits

Wolfson, Ouri E.

482

Bridging Relational Database History and the Web: the XML Approach  

E-Print Network [OSTI]

Bridging Relational Database History and the Web: the XML Approach Fusheng Wang Integrated Data and queries, and make it easy to pub- lish database history to the Web. In this paper, we focus on the problem of preserving, publishing, and querying ef- ficiently the history of a relational database. Past research

Zaniolo, Carlo

483

Navigocorpus: A Database for Shipping Information A Methodological and  

E-Print Network [OSTI]

of Maritime History XXIII, 2 (2011) 241-262" #12;Jean-Pierre Dedieu, et al. the database on-line beginningNavigocorpus: A Database for Shipping Information ­ A Methodological and Technical Introduction and stored them in databases which are generally organized according to the nature of the sources used

Paris-Sud XI, Université de

484

Preserving and Querying Histories of XML-Published Relational Databases  

E-Print Network [OSTI]

Preserving and Querying Histories of XML-Published Relational Databases Fusheng Wang and Carlo the evolution history of such a view as yet another XML document, whereby the complete history of the database, and identify and select those which are best for representing and querying database histories. We show

Zaniolo, Carlo

485

Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan  

E-Print Network [OSTI]

Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www and Sudarshan2.2Database System Concepts - 5th Edition, Oct 5, 2006 Chapter 2: Relational ModelChapter 2: Relational Model Structure of Relational Databases Fundamental Relational-Algebra-Operations Additional

Dragan, Feodor F.

486

Banner Database Clone Request Form ETSU Office of Information Technology  

E-Print Network [OSTI]

Banner Database Clone Request Form ETSU Office of Information Technology 424 Roy S. Nicks Hall, Box Instance: Clone Destination Instance: PROD TSTH TSTH TEST TEST Requested Banner database clone dates: [ clone on/after date ] [ clone required by date ] Banner database clone special requests

Karsai, Istvan

487

Database Managament IS&M Option Mark Levene  

E-Print Network [OSTI]

Database Managament IS&M Option Mark Levene Email: m.levene@dcs.bbk.ac.uk Web: http://www.dcs.bbk.ac.uk/~mark/ Lecture Plan 1. Introduction to Databases 2. Data Modelling with the Entity-Relationship Model 3 and Referential Integrity 4. Querying a Relational Database (a) Querying a Single Table (b) Aggregating

Levene, Mark

488

SPIKE: a database of highly curated human signaling pathways  

E-Print Network [OSTI]

SPIKE: a database of highly curated human signaling pathways Arnon Paz1 , Zippora Brownstein1 Knowledge Engine; http:// www.cs.tau.ac.il/spike/) is a database for achieving this goal, containing highly on the nature of each interaction. To make database population and pathway comprehension straightforward

Avraham, Karen

489

Faculty Database User Instructions Spectral Fusion Designs Page 1  

E-Print Network [OSTI]

Faculty Database User Instructions Spectral Fusion Designs Page 1 Faculty, Staff, and Student Instructions Introduction The Faculty Database is a tool created by Spectral Fusion Designs (SFD faculty, staff, or graduate students must be added to the Faculty Database by departmental administrators

Chu, Xi

490

Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan  

E-Print Network [OSTI]

Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www.2Database System Concepts, 5th Edition, Oct 5. 2006 Chapter 4: Advanced SQLChapter 4: Advanced SQL SQL Data Constructs** Recursive Queries** Advanced SQL Features** #12;©Silberschatz, Korth and Sudarshan4.3Database

Dragan, Feodor F.

491

Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan  

E-Print Network [OSTI]

Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www;©Silberschatz, Korth and Sudarshan6.2Database System Concepts - 5th Edition, Oct 5, 2006 Chapter 6: Entity Design Issues Weak Entity Sets Extended E-R Features Design of the Bank Database Reduction to Relation

Dragan, Feodor F.

492

Calculating Very Rough Market Share Using the Canadian Business Database  

E-Print Network [OSTI]

Calculating Very Rough Market Share Using the Canadian Business Database If you cannot find market market share using the company information provided in the Canadian Business Database (CBD), an online - it should be considered a last resort for this information. STEP 1: ACCESS THE CANADIAN BUSINESS DATABASE 1a

Thompson, Michael

493

Database Connects Public to University of Nebraska Research  

E-Print Network [OSTI]

Database Connects Public to University of Nebraska Research By Steve Ress There's a wealth of water easier. An easily accessible and searchable database sponsored by the University of Nebraska Rachael Herpel, outreach and education specialist at the UNL Water Center. The database can be found

Nebraska-Lincoln, University of

494

Database Research: Achievements and Opportunities Into the 21st Century  

E-Print Network [OSTI]

Database Research: Achievements and Opportunities Into the 21st Century Avi Silberschatz, Mike Stonebraker, Jeff Ullman, editors Report of an NSF Workshop on the Future of Database Systems Research, May 26--27, 1995 1 1 Introduction In February of 1990, a group of database researchers met to examine the prospects

Ullman, Jeffrey D.

495

Development of a Series of National Coalbed Methane Databases  

E-Print Network [OSTI]

Development of a Series of National Coalbed Methane Databases Mohaghegh, S. D., Nunsavathu, U Growing Interest in Coalbed Methane ­ Elevated natural gas prices ­ Demand for clean energy sources DatabaseDatabase One Location Reservoir & Sorption Collection ­ 126 Coalbed Areas ­ 34 Parameters Ordered

Mohaghegh, Shahab

496

A Survey of Single-Database PIR: Techniques and Applications  

E-Print Network [OSTI]

A Survey of Single-Database PIR: Techniques and Applications Rafail Ostrovsky William E. Skeith III Abstract In this paper we survey the notion of Single-Database Private Information Re- trieval (PIR). The first Single-Database PIR was constructed in 1997 by Kushilevitz and Ostrovsky and since then Single

Ostrovsky, Rafail

497

A Survey of SingleDatabase PIR: Techniques and Applications #  

E-Print Network [OSTI]

A Survey of Single­Database PIR: Techniques and Applications # Rafail Ostrovsky + William E. Skeith (PIR). The first Single­Database PIR was constructed in 1997 by Kushilevitz and Ostrovsky and since then Single­Database PIR has emerged as an important cryp­ tographic primitive. For example, Single

498

A Survey of SingleDatabase PIR: Techniques and Applications  

E-Print Network [OSTI]

A Survey of Single­Database PIR: Techniques and Applications Rafail Ostrovsky # William E. Skeith (PIR). The first Single­Database PIR was constructed in 1997 by Kushilevitz and Ostrovsky and since then Single­Database PIR has emerged as an important cryp­ tographic primitive. For example, Single

Ostrovsky, Rafail

499

Version 1.00 programmer`s tools used in constructing the INEL RML/analytical radiochemistry sample tracking database and its user interface  

SciTech Connect (OSTI)

This report describes two code-generating tools used to speed design and implementation of relational databases and user interfaces: CREATE-SCHEMA and BUILD-SCREEN. CREATE-SCHEMA produces the SQL commands that actually create and define the database. BUILD-SCREEN takes templates for data entry screens and generates the screen management system routine calls to display the desired screen. Both tools also generate the related FORTRAN declaration statements and precompiled SQL calls. Included with this report is the source code for a number of FORTRAN routines and functions used by the user interface. This code is broadly applicable to a number of different databases.

Femec, D.A.

1995-09-01T23:59:59.000Z

500

Energy Citations Database (ECD) - Alerts Help  

Office of Scientific and Technical Information (OSTI)

Help Alerts Registration - Receiving Alerts - Renewing your registration Alerts Log On Changing E-mail Address ECD Alerts Contact Us Managing your Alerts - Requesting an Alert or...